Edit tour
Windows
Analysis Report
Handler.exe
Overview
General Information
Detection
DanaBot, Vidar
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Attempt to bypass Chrome Application-Bound Encryption
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DanaBot stealer dll
Yara detected Vidar stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May use the Tor software to hide its network traffic
Monitors registry run keys for changes
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the installation date of Windows
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Browser Started with Remote Debugging
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
- Handler.exe (PID: 6332 cmdline:
"C:\Users\ user\Deskt op\Handler .exe" MD5: 9C11F8B0F55DFBCD4B67C6A56FB0F11F) - Handler.exe (PID: 5532 cmdline:
"C:\Users\ user\Deskt op\Handler .exe" MD5: 9C11F8B0F55DFBCD4B67C6A56FB0F11F) - chrome.exe (PID: 5428 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7364 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2420 --fi eld-trial- handle=229 6,i,162658 8840574023 3953,48725 6461960710 161,262144 /prefetch :8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - msedge.exe (PID: 5000 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=922 3 --profil e-director y="Default " MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7456 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=28 40 --field -trial-han dle=2512,i ,645686254 3723051925 ,695205624 0322509196 ,262144 /p refetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - 5fctr1d2dt.exe (PID: 2460 cmdline:
"C:\Progra mData\5fct r1d2dt.exe " MD5: 0A6AE4DE16757CD121632BAD3A903EDA) - cmd.exe (PID: 8048 cmdline:
"C:\Window s\system32 \cmd.exe" /c timeout /t 10 & r d /s /q "C :\ProgramD ata\tjw47" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1776 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - timeout.exe (PID: 7132 cmdline:
timeout /t 10 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3) - WerFault.exe (PID: 4996 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 332 -s 912 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- msedge.exe (PID: 6524 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --remot e-debuggin g-port=922 3 --profil e-director y=Default --flag-swi tches-begi n --flag-s witches-en d --disabl e-nacl --d o-not-de-e levate MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7792 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 48 --field -trial-han dle=2036,i ,708804138 0943478253 ,128227021 3720589819 8,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8896 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 6636 --fie ld-trial-h andle=2036 ,i,7088041 3809434782 53,1282270 2137205898 198,262144 /prefetch :8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8920 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6692 --field-t rial-handl e=2036,i,7 0880413809 43478253,1 2822702137 205898198, 262144 /pr efetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 5688 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=678 8 --field- trial-hand le=2036,i, 7088041380 943478253, 1282270213 7205898198 ,262144 /p refetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DanaBot | Proofpoints describes DanaBot as the latest example of malware focused on persistence and stealing useful information that can later be monetized rather than demanding an immediate ransom from victims. The social engineering in the low-volume DanaBot campaigns we have observed so far has been well-crafted, again pointing to a renewed focus on quality over quantity in email-based threats. DanaBots modular nature enables it to download additional components, increasing the flexibility and robust stealing and remote monitoring capabilities of this banker. |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Vidar | Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. | No Attribution |
{"C2 url": "https://steamcommunity.com/profiles/76561199817305251", "Botnet": "fc0stn"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_DanaBot_stealer_dll | Yara detected DanaBot stealer dll | Joe Security | ||
INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_DanaBot_stealer_dll | Yara detected DanaBot stealer dll | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
infostealer_win_vidar_strings_nov23 | Finds Vidar samples based on the specific strings | Sekoia.io |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_DanaBot_stealer_dll | Yara detected DanaBot stealer dll | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
infostealer_win_vidar_strings_nov23 | Finds Vidar samples based on the specific strings | Sekoia.io |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_DanaBot_stealer_dll | Yara detected DanaBot stealer dll | Joe Security | ||
INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen |
|
System Summary |
---|
Source: | Author: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T20:19:53.015704+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50153 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:19:54.082347+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50154 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:19:55.151041+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50155 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:19:56.241118+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50156 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:20:04.770521+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50161 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:20:06.284573+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50162 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:20:07.358470+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50163 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:20:08.468651+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50164 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:20:13.851435+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50169 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:20:13.943084+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50170 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:20:14.046521+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50171 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:20:14.118497+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50172 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:20:24.230553+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50177 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:20:25.607663+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50178 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:20:27.120388+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50179 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:20:28.847889+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50180 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:20:31.925010+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50186 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:20:33.699941+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50187 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:20:35.791850+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50188 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:20:38.127481+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50189 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:20:46.985963+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50194 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:20:47.245561+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50195 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:20:47.309421+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50196 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:20:47.390933+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50197 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:20:59.025854+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50202 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:21:00.728744+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50203 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:21:02.343703+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50204 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:21:04.091742+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50205 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:21:07.450686+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50210 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:21:10.582921+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50211 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:21:12.243924+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50212 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:21:14.265625+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50213 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:21:24.931833+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50218 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:21:25.115172+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50219 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:21:25.190354+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50220 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:21:25.259897+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50221 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:21:37.531139+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50230 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:21:39.918996+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50231 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:21:42.320074+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50232 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:21:44.447372+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50233 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:21:47.720809+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50238 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:21:50.006135+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50239 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:21:52.386471+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50240 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:21:54.315688+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50241 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:22:07.071343+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50246 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:22:07.148491+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50247 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:22:07.207800+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50248 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:22:07.362129+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50249 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:22:20.363821+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50254 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:22:22.517469+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50255 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:22:24.571433+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50256 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:22:27.083896+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50257 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:22:33.105371+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50262 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:22:35.617116+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50264 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:22:38.426327+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50265 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:22:40.553392+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50266 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:22:50.591405+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50271 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:22:51.645106+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50272 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:22:51.696595+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50273 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:22:51.746232+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50274 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:22:59.064229+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50280 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:00.124036+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50281 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:01.192019+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50282 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:02.271321+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50283 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:06.560514+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50288 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:07.625264+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50289 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:08.703222+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50290 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:09.783625+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50291 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:15.141834+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50296 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:15.203064+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50297 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:15.259160+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50298 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:15.298852+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50299 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:22.714479+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50304 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:23.787978+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50305 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:24.848904+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50306 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:25.927267+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50307 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:28.177253+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50312 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:29.249088+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50313 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:30.309694+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50315 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:31.378227+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50316 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:36.805374+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50321 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:36.899069+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50322 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:36.967069+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50323 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:37.060533+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50324 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:44.434309+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50329 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:45.509985+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50330 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:46.574322+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50331 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:47.644057+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50332 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:49.926270+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50337 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:50.976077+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50338 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:52.039216+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50339 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:53.098455+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50340 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:58.450091+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50345 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:59.514195+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50346 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:23:59.566001+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50347 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:23:59.610152+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50348 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:06.953078+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50353 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:08.015118+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50354 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:09.089842+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50355 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:10.151117+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50356 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:13.432688+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50361 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:14.486677+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50362 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:15.552062+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50363 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:16.619126+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50364 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:21.997547+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50369 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:23.049803+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50370 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:23.092225+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50371 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:23.134597+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50372 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:30.510015+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50377 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:31.578901+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50378 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:32.639796+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50379 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:33.700768+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50380 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:35.974018+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50385 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:37.026914+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50386 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:38.089134+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50387 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:39.152177+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50388 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:44.447122+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50393 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:44.483034+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50394 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:44.519352+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50395 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:44.567987+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50396 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:51.920714+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50401 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:52.983127+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50402 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:54.065676+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50403 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:55.123477+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50404 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:57.389829+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50409 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:24:58.447862+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50410 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:24:59.515023+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50411 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:00.581957+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50412 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:05.908443+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50417 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:05.963485+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50418 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:06.009018+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50419 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:06.050800+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50420 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:13.354159+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50425 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:14.415003+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50426 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:15.466121+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50427 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:16.529564+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50428 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:19.754728+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50433 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:20.845693+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50434 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:21.900935+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50435 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:22.973628+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50436 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:28.267094+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50441 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:28.313680+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50442 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:28.361448+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50443 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:28.421225+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50444 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:35.773743+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50452 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:36.842967+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50453 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:37.900452+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50454 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:38.971056+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50455 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:43.259077+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50460 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:44.329095+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50461 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:45.388046+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50462 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:46.441337+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50463 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:51.760317+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50468 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:51.822716+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50469 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:51.864617+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50470 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:25:51.916196+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50471 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:25:59.260999+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50476 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:00.334930+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50477 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:01.401136+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50478 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:02.471031+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50479 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:05.800298+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50484 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:06.873058+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50485 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:07.941727+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50486 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:09.001780+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50487 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:14.357221+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50492 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:15.413950+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50493 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:15.458655+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50494 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:15.504575+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50495 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:22.871014+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50500 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:23.930685+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50501 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:24.989634+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50502 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:26.043654+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50503 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:28.315789+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50508 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:29.381302+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50509 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:30.457362+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50510 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:31.502261+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50511 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:37.853852+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50516 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:37.921807+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50517 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:37.971944+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50518 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:38.021842+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50519 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:45.372324+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50524 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:46.453491+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50525 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:47.530739+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50526 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:48.594826+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50527 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:51.859266+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50532 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:52.907366+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50533 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:26:53.967293+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50534 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:26:55.033796+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50535 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:27:00.354917+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50540 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:27:00.406787+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50541 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:27:00.450814+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50542 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:27:01.514900+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50543 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:27:08.872933+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50548 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:27:09.931980+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50549 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:27:10.997138+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50550 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:27:12.062823+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50551 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:27:14.321035+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50556 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:27:15.392007+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50557 | 45.76.251.57 | 443 | TCP |
2025-01-13T20:27:16.456889+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50558 | 194.32.76.77 | 443 | TCP |
2025-01-13T20:27:17.512984+0100 | 2034465 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 50559 | 45.76.251.57 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T20:18:09.623773+0100 | 2044247 | 1 | Malware Command and Control Activity Detected | 116.203.11.8 | 443 | 192.168.2.5 | 49715 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T20:18:10.999225+0100 | 2051831 | 1 | Malware Command and Control Activity Detected | 116.203.11.8 | 443 | 192.168.2.5 | 49716 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T20:18:09.623230+0100 | 2049087 | 1 | A Network Trojan was detected | 192.168.2.5 | 49715 | 116.203.11.8 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T20:18:53.618341+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 50022 | 162.0.209.157 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-13T20:18:06.610608+0100 | 2859378 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49709 | 116.203.11.8 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 1_2_0040C009 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 1_2_0041008C | |
Source: | Code function: | 1_2_004291EA | |
Source: | Code function: | 1_2_00428248 | |
Source: | Code function: | 1_2_0042A4E5 | |
Source: | Code function: | 1_2_0040E749 | |
Source: | Code function: | 1_2_0040177C | |
Source: | Code function: | 1_2_00412AC9 | |
Source: | Code function: | 1_2_0040CCEA | |
Source: | Code function: | 1_2_0042BD1E | |
Source: | Code function: | 1_2_004018DA |
Source: | Code function: | 1_2_00428DDA |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | Suricata IDS: |
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | Code function: | 1_2_0040A09E |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |