Windows
Analysis Report
pkFIMBYMWr.exe
Overview
General Information
Sample name: | pkFIMBYMWr.exerenamed because original name is a hash value |
Original sample name: | 769cc0701ddb3b77485187f4cfb89f53.exe |
Analysis ID: | 1635682 |
MD5: | 769cc0701ddb3b77485187f4cfb89f53 |
SHA1: | 3483f93d4ddba48dc3b2a57299bbf5dfed6c9a66 |
SHA256: | 1dc6f8dbbf2f2aa8359db7fdf4b71068a64faef5fc56d7452744ea3fde30a12a |
Tags: | exenjratRATuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
pkFIMBYMWr.exe (PID: 7824 cmdline:
"C:\Users\ user\Deskt op\pkFIMBY MWr.exe" MD5: 769CC0701DDB3B77485187F4CFB89F53) server.exe (PID: 8176 cmdline:
"C:\Window s\server.e xe" MD5: 769CC0701DDB3B77485187F4CFB89F53) netsh.exe (PID: 2132 cmdline:
netsh fire wall add a llowedprog ram "C:\Wi ndows\serv er.exe" "s erver.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF) conhost.exe (PID: 5096 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) netsh.exe (PID: 480 cmdline:
netsh fire wall delet e allowedp rogram "C: \Windows\s erver.exe" MD5: 4E89A1A088BE715D6C946E55AB07C7DF) conhost.exe (PID: 5744 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) netsh.exe (PID: 5720 cmdline:
netsh fire wall add a llowedprog ram "C:\Wi ndows\serv er.exe" "s erver.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF) conhost.exe (PID: 3576 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
0db0e27f45963af1d9fd7ae9a9419dc1Windows Update.exe (PID: 7896 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\0db 0e27f45963 af1d9fd7ae 9a9419dc1W indows Upd ate.exe" MD5: 769CC0701DDB3B77485187F4CFB89F53)
0db0e27f45963af1d9fd7ae9a9419dc1Windows Update.exe (PID: 7824 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\0db 0e27f45963 af1d9fd7ae 9a9419dc1W indows Upd ate.exe" MD5: 769CC0701DDB3B77485187F4CFB89F53)
krnl-fixer268.exe (PID: 6160 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\krn l-fixer268 .exe" MD5: 769CC0701DDB3B77485187F4CFB89F53)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
NjRAT | RedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored. |
{
"Campaign ID": "krnl-fixer-268",
"Version": "0.7d",
"Install Name": "0db0e27f45963af1d9fd7ae9a9419dc1",
"Install Dir": "system",
"Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run",
"Network Seprator": "|'|'|"
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
CN_disclosed_20180208_c | Detects malware from disclosed CN malware set | Florian Roth |
| |
crimeware_njrat_strings | Detects njRAT based on some strings | Sekoia.io |
| |
Njrat | detect njRAT in memory | JPCERT/CC Incident Response Group |
| |
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
CN_disclosed_20180208_c | Detects malware from disclosed CN malware set | Florian Roth |
| |
CN_disclosed_20180208_c | Detects malware from disclosed CN malware set | Florian Roth |
| |
CN_disclosed_20180208_c | Detects malware from disclosed CN malware set | Florian Roth |
| |
Click to see the 61 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
Njrat | detect njRAT in memory | JPCERT/CC Incident Response Group |
| |
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
CN_disclosed_20180208_c | Detects malware from disclosed CN malware set | Florian Roth |
| |
crimeware_njrat_strings | Detects njRAT based on some strings | Sekoia.io |
| |
Njrat | detect njRAT in memory | JPCERT/CC Incident Response Group |
| |
Click to see the 1 entries |
System Summary |
---|
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T22:12:37.241181+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49726 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:39.492735+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49728 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:42.068817+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49729 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:44.766529+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49731 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:47.346311+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:49.944665+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49733 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:52.532541+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49735 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:55.113465+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49736 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:57.774873+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49737 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:00.346176+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49738 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:02.950533+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49739 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:05.726508+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49740 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:08.336351+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49741 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:10.925278+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:13.544698+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49743 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:16.150890+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49744 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:18.881889+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49745 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:21.331321+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49746 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:23.681578+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49748 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:26.068195+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49749 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:28.216458+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49750 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:30.304462+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49751 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:32.217567+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49752 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:34.028917+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49753 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:36.745552+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49754 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:39.502585+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49755 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:42.221169+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49756 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:44.814720+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49757 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:47.383667+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49758 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:50.000424+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49759 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:52.595955+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49760 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:55.159262+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49761 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:57.830323+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49762 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:00.642413+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49763 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:03.457497+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49764 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:06.125665+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49765 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:09.762628+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49766 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:12.452093+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49767 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:15.103461+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49768 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:18.591925+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49769 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:21.212318+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49770 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:23.881920+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49771 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:26.835180+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49772 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:31.371483+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49773 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:33.676398+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49774 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:37.183178+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49775 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:40.601098+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49776 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:44.770637+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49777 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:53.392647+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49778 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:56.147054+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49779 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:58.981079+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49780 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:02.331049+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49781 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:05.029814+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49782 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:08.366304+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49783 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:11.026844+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49784 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:16.735726+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49785 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:18.871089+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49786 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:21.506700+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49787 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:49.916215+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49788 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:52.003121+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49789 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:54.581613+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49790 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:58.164615+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49791 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:10.483002+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49792 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:26.502895+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49793 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:32.419279+0100 | 2021176 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49794 | 3.125.188.168 | 15408 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T22:12:37.241181+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49726 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:39.492735+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49728 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:42.068817+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49729 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:44.766529+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49731 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:47.346311+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:49.944665+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49733 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:52.532541+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49735 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:55.113465+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49736 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:57.774873+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49737 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:00.346176+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49738 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:02.950533+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49739 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:05.726508+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49740 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:08.336351+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49741 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:10.925278+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:13.544698+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49743 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:16.150890+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49744 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:18.881889+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49745 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:21.331321+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49746 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:23.681578+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49748 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:26.068195+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49749 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:28.216458+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49750 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:30.304462+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49751 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:32.217567+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49752 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:34.028917+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49753 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:36.745552+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49754 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:39.502585+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49755 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:42.221169+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49756 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:44.814720+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49757 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:47.383667+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49758 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:50.000424+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49759 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:52.595955+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49760 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:55.159262+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49761 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:57.830323+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49762 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:00.642413+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49763 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:03.457497+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49764 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:06.125665+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49765 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:09.762628+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49766 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:12.452093+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49767 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:15.103461+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49768 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:18.591925+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49769 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:21.212318+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49770 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:23.881920+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49771 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:26.835180+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49772 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:31.371483+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49773 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:33.676398+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49774 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:37.183178+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49775 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:40.601098+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49776 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:44.770637+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49777 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:53.392647+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49778 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:56.147054+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49779 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:58.981079+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49780 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:02.331049+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49781 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:05.029814+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49782 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:08.366304+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49783 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:11.026844+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49784 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:16.735726+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49785 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:18.871089+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49786 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:21.506700+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49787 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:49.916215+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49788 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:52.003121+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49789 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:54.581613+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49790 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:58.164615+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49791 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:10.483002+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49792 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:26.502895+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49793 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:32.419279+0100 | 2033132 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49794 | 3.125.188.168 | 15408 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T22:12:18.394523+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49719 | 104.26.12.205 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T22:12:44.858941+0100 | 2825564 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49731 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:55.483631+0100 | 2825564 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49736 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:16:32.736959+0100 | 2825564 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49794 | 3.125.188.168 | 15408 | TCP |
- • AV Detection
- • Compliance
- • Spreading
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • E-Banking Fraud
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Lowering of HIPS / PFW / Operating System Security Settings
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | File opened: |
Source: | Static PE information: |
Spreading |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | File created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Window created: | ||
Source: | Window created: | ||
Source: | Window created: | ||
Source: | Window created: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process Stats: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | File opened: |
Source: | Static PE information: |
Source: | File opened: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Persistence and Installation Behavior |
---|
Source: | Executable created and started: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: |
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | Window / User API: | ||
Source: | Window / User API: | ||
Source: | Window / User API: | ||
Source: | Window / User API: |
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: |
Source: | Last function: |
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: |
Source: | Process token adjusted: |
Source: | Memory allocated: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Source: | Key value queried: |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Registry value created: | Jump to behavior |
Source: | Process created: |
Source: | Process created: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 21 Replication Through Removable Media | Windows Management Instrumentation | 12 Registry Run Keys / Startup Folder | 12 Process Injection | 132 Masquerading | OS Credential Dumping | 11 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 12 Registry Run Keys / Startup Folder | 41 Disable or Modify Tools | LSASS Memory | 2 Process Discovery | Remote Desktop Protocol | 1 Clipboard Data | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 31 Virtualization/Sandbox Evasion | Security Account Manager | 31 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 12 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 1 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 1 Peripheral Device Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 12 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
82% | Virustotal | Browse | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
100% | Avira | TR/Dropper.Gen |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/Dropper.Gen | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Avira | TR/Dropper.Gen | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
87% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
7.tcp.eu.ngrok.io | 3.67.15.169 | true | true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
3.125.188.168 | unknown | United States | 16509 | AMAZON-02US | true | |
3.67.15.169 | 7.tcp.eu.ngrok.io | United States | 16509 | AMAZON-02US | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1635682 |
Start date and time: | 2025-03-11 22:11:15 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 9m 8s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 1 |
Technologies: |
|
Analysis Mode: | default |
Sample name: | pkFIMBYMWr.exerenamed because original name is a hash value |
Original Sample Name: | 769cc0701ddb3b77485187f4cfb89f53.exe |
Detection: | MAL |
Classification: | mal100.spre.phis.troj.adwa.evad.winEXE@15/19@4/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, c onsent.exe, WMIADAP.exe, SIHCl ient.exe, conhost.exe, svchost .exe - TCP Packets have been reduced
to 100 - Excluded IPs from analysis (wh
itelisted): 2.16.185.191, 4.17 5.87.197 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, slscr.update.microsoft.com , prod.fs.microsoft.com.akadns .net, fs-wildcard.microsoft.co m.edgekey.net, fs-wildcard.mic rosoft.com.edgekey.net.globalr edir.akadns.net, e16604.dscf.a kamaiedge.net, fe3cr.delivery. mp.microsoft.com - Not all processes where analyz
ed, report is missing behavior information - Report size exceeded maximum c
apacity and may have missing b ehavior information. - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
17:13:11 | API Interceptor | |
21:12:35 | Autostart | |
21:12:44 | Autostart |
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.564743931313968 |
Encrypted: | false |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
MD5: | 769CC0701DDB3B77485187F4CFB89F53 |
SHA1: | 3483F93D4DDBA48DC3B2A57299BBF5DFED6C9A66 |
SHA-256: | 1DC6F8DBBF2F2AA8359DB7FDF4B71068A64FAEF5FC56D7452744EA3FDE30A12A |
SHA-512: | 453C4E89B5956348F9E768BCBC971AC548CEE43033F3AB741EA0AE7B4B64C8EDDD6F755183C6CD0B20D822201C0DF328806E97606037AAC6E70074548D06218F |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.564743931313968 |
Encrypted: | false |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
MD5: | 769CC0701DDB3B77485187F4CFB89F53 |
SHA1: | 3483F93D4DDBA48DC3B2A57299BBF5DFED6C9A66 |
SHA-256: | 1DC6F8DBBF2F2AA8359DB7FDF4B71068A64FAEF5FC56D7452744EA3FDE30A12A |
SHA-512: | 453C4E89B5956348F9E768BCBC971AC548CEE43033F3AB741EA0AE7B4B64C8EDDD6F755183C6CD0B20D822201C0DF328806E97606037AAC6E70074548D06218F |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0db0e27f45963af1d9fd7ae9a9419dc1Windows Update.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 525 |
Entropy (8bit): | 5.259753436570609 |
Encrypted: | false |
SSDEEP: | 12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve |
MD5: | 260E01CC001F9C4643CA7A62F395D747 |
SHA1: | 492AD0ACE3A9C8736909866EEA168962D418BE5A |
SHA-256: | 4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030 |
SHA-512: | 01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\krnl-fixer268.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 525 |
Entropy (8bit): | 5.259753436570609 |
Encrypted: | false |
SSDEEP: | 12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve |
MD5: | 260E01CC001F9C4643CA7A62F395D747 |
SHA1: | 492AD0ACE3A9C8736909866EEA168962D418BE5A |
SHA-256: | 4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030 |
SHA-512: | 01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\pkFIMBYMWr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 525 |
Entropy (8bit): | 5.259753436570609 |
Encrypted: | false |
SSDEEP: | 12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve |
MD5: | 260E01CC001F9C4643CA7A62F395D747 |
SHA1: | 492AD0ACE3A9C8736909866EEA168962D418BE5A |
SHA-256: | 4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030 |
SHA-512: | 01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4 |
Malicious: | true |
Preview: |
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.564743931313968 |
Encrypted: | false |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
MD5: | 769CC0701DDB3B77485187F4CFB89F53 |
SHA1: | 3483F93D4DDBA48DC3B2A57299BBF5DFED6C9A66 |
SHA-256: | 1DC6F8DBBF2F2AA8359DB7FDF4B71068A64FAEF5FC56D7452744EA3FDE30A12A |
SHA-512: | 453C4E89B5956348F9E768BCBC971AC548CEE43033F3AB741EA0AE7B4B64C8EDDD6F755183C6CD0B20D822201C0DF328806E97606037AAC6E70074548D06218F |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.564743931313968 |
Encrypted: | false |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
MD5: | 769CC0701DDB3B77485187F4CFB89F53 |
SHA1: | 3483F93D4DDBA48DC3B2A57299BBF5DFED6C9A66 |
SHA-256: | 1DC6F8DBBF2F2AA8359DB7FDF4B71068A64FAEF5FC56D7452744EA3FDE30A12A |
SHA-512: | 453C4E89B5956348F9E768BCBC971AC548CEE43033F3AB741EA0AE7B4B64C8EDDD6F755183C6CD0B20D822201C0DF328806E97606037AAC6E70074548D06218F |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.564743931313968 |
Encrypted: | false |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
MD5: | 769CC0701DDB3B77485187F4CFB89F53 |
SHA1: | 3483F93D4DDBA48DC3B2A57299BBF5DFED6C9A66 |
SHA-256: | 1DC6F8DBBF2F2AA8359DB7FDF4B71068A64FAEF5FC56D7452744EA3FDE30A12A |
SHA-512: | 453C4E89B5956348F9E768BCBC971AC548CEE43033F3AB741EA0AE7B4B64C8EDDD6F755183C6CD0B20D822201C0DF328806E97606037AAC6E70074548D06218F |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.564743931313968 |
Encrypted: | false |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
MD5: | 769CC0701DDB3B77485187F4CFB89F53 |
SHA1: | 3483F93D4DDBA48DC3B2A57299BBF5DFED6C9A66 |
SHA-256: | 1DC6F8DBBF2F2AA8359DB7FDF4B71068A64FAEF5FC56D7452744EA3FDE30A12A |
SHA-512: | 453C4E89B5956348F9E768BCBC971AC548CEE43033F3AB741EA0AE7B4B64C8EDDD6F755183C6CD0B20D822201C0DF328806E97606037AAC6E70074548D06218F |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.564743931313968 |
Encrypted: | false |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
MD5: | 769CC0701DDB3B77485187F4CFB89F53 |
SHA1: | 3483F93D4DDBA48DC3B2A57299BBF5DFED6C9A66 |
SHA-256: | 1DC6F8DBBF2F2AA8359DB7FDF4B71068A64FAEF5FC56D7452744EA3FDE30A12A |
SHA-512: | 453C4E89B5956348F9E768BCBC971AC548CEE43033F3AB741EA0AE7B4B64C8EDDD6F755183C6CD0B20D822201C0DF328806E97606037AAC6E70074548D06218F |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.564743931313968 |
Encrypted: | false |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
MD5: | 769CC0701DDB3B77485187F4CFB89F53 |
SHA1: | 3483F93D4DDBA48DC3B2A57299BBF5DFED6C9A66 |
SHA-256: | 1DC6F8DBBF2F2AA8359DB7FDF4B71068A64FAEF5FC56D7452744EA3FDE30A12A |
SHA-512: | 453C4E89B5956348F9E768BCBC971AC548CEE43033F3AB741EA0AE7B4B64C8EDDD6F755183C6CD0B20D822201C0DF328806E97606037AAC6E70074548D06218F |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\pkFIMBYMWr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5 |
Entropy (8bit): | 1.9219280948873623 |
Encrypted: | false |
SSDEEP: | 3:yn:yn |
MD5: | 24E9E7D7EEA4DE90C8FC67AE1145ABF2 |
SHA1: | DD9BB46CCC6340CA892CF17EBE32B9BDBADEE2D1 |
SHA-256: | BD6C1D15579254E8879ADA07376F93CB2E959F45670374892FDE2EFAF4194F6C |
SHA-512: | 5572AFD61C7BA666515A987F23AD0A05AB753BDC28CFA492ADB30200207427A4A38699D3B7981E0750414775A4CE72A209511951D38A8673C709B08774FCA01F |
Malicious: | false |
Preview: |
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.564743931313968 |
Encrypted: | false |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
MD5: | 769CC0701DDB3B77485187F4CFB89F53 |
SHA1: | 3483F93D4DDBA48DC3B2A57299BBF5DFED6C9A66 |
SHA-256: | 1DC6F8DBBF2F2AA8359DB7FDF4B71068A64FAEF5FC56D7452744EA3FDE30A12A |
SHA-512: | 453C4E89B5956348F9E768BCBC971AC548CEE43033F3AB741EA0AE7B4B64C8EDDD6F755183C6CD0B20D822201C0DF328806E97606037AAC6E70074548D06218F |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.564743931313968 |
Encrypted: | false |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
MD5: | 769CC0701DDB3B77485187F4CFB89F53 |
SHA1: | 3483F93D4DDBA48DC3B2A57299BBF5DFED6C9A66 |
SHA-256: | 1DC6F8DBBF2F2AA8359DB7FDF4B71068A64FAEF5FC56D7452744EA3FDE30A12A |
SHA-512: | 453C4E89B5956348F9E768BCBC971AC548CEE43033F3AB741EA0AE7B4B64C8EDDD6F755183C6CD0B20D822201C0DF328806E97606037AAC6E70074548D06218F |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\pkFIMBYMWr.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.564743931313968 |
Encrypted: | false |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
MD5: | 769CC0701DDB3B77485187F4CFB89F53 |
SHA1: | 3483F93D4DDBA48DC3B2A57299BBF5DFED6C9A66 |
SHA-256: | 1DC6F8DBBF2F2AA8359DB7FDF4B71068A64FAEF5FC56D7452744EA3FDE30A12A |
SHA-512: | 453C4E89B5956348F9E768BCBC971AC548CEE43033F3AB741EA0AE7B4B64C8EDDD6F755183C6CD0B20D822201C0DF328806E97606037AAC6E70074548D06218F |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55 |
Entropy (8bit): | 4.474554204780528 |
Encrypted: | false |
SSDEEP: | 3:It1KV2PHQCyK0x:e1KAwCyD |
MD5: | 40B1630BE21F39CB17BD1963CAE5A207 |
SHA1: | 63C14BD151D42820DD45C033363FA5B9E1D34124 |
SHA-256: | F87E55F1A423B65FD639146F71F6027DBD4D6E69B65D9A17F1744774AA6589E1 |
SHA-512: | 833112ED4A9A3C621D2FFFC78F83502B2937B82A2CF9BC692D75D907CE2AA46C2D97CFE23C402DB3292B2DD2655FF8692C3CD00D5BA4D792C3D8AF24958E1926 |
Malicious: | true |
Preview: |
Process: | C:\Windows\SysWOW64\netsh.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 313 |
Entropy (8bit): | 4.971939296804078 |
Encrypted: | false |
SSDEEP: | 6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha |
MD5: | 689E2126A85BF55121488295EE068FA1 |
SHA1: | 09BAAA253A49D80C18326DFBCA106551EBF22DD6 |
SHA-256: | D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25 |
SHA-512: | C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.564743931313968 |
TrID: |
|
File name: | pkFIMBYMWr.exe |
File size: | 95'232 bytes |
MD5: | 769cc0701ddb3b77485187f4cfb89f53 |
SHA1: | 3483f93d4ddba48dc3b2a57299bbf5dfed6c9a66 |
SHA256: | 1dc6f8dbbf2f2aa8359db7fdf4b71068a64faef5fc56d7452744ea3fde30a12a |
SHA512: | 453c4e89b5956348f9e768bcbc971ac548cee43033f3ab741ea0ae7b4b64c8eddd6f755183c6cd0b20d822201c0df328806e97606037aac6e70074548d06218f |
SSDEEP: | 768:wY3IGLyZnDQMMpAZrGSt6udttXyoslhkGJiXxrjEtCdnl2pi1Rz4Rk3tsGdplgS7:wGuZD3rGWNd7yhkhjEwzGi1dDdDlgS |
TLSH: | 4293E84977E96524E0BF56F75471F2004E35B48B1602E39E58F218AA0B33AC44F99FEB |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...;..b.................p............... ........@.. ....................................@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x418f1e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6286863B [Thu May 19 18:02:35 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x18ecc | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x1a000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x16f24 | 0x17000 | 04a6d895710f7d584eeb20323c0daa07 | False | 0.3685355808423913 | data | 5.596409957679938 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0x1a000 | 0xc | 0x200 | 9dc49a004fa3bd643fadc899ad4fdf5d | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-11T22:12:18.394523+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49719 | 104.26.12.205 | 443 | TCP |
2025-03-11T22:12:37.241181+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49726 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:37.241181+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49726 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:39.492735+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49728 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:39.492735+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49728 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:42.068817+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49729 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:42.068817+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49729 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:44.766529+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49731 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:44.766529+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49731 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:44.858941+0100 | 2825564 | ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) | 1 | 192.168.2.4 | 49731 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:47.346311+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49732 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:47.346311+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49732 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:49.944665+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49733 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:49.944665+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49733 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:52.532541+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49735 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:52.532541+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49735 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:55.113465+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49736 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:55.113465+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49736 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:55.483631+0100 | 2825564 | ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) | 1 | 192.168.2.4 | 49736 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:57.774873+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49737 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:12:57.774873+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49737 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:00.346176+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49738 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:00.346176+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49738 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:02.950533+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49739 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:02.950533+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49739 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:05.726508+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49740 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:05.726508+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49740 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:08.336351+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49741 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:08.336351+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49741 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:10.925278+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49742 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:10.925278+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49742 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:13.544698+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49743 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:13.544698+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49743 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:16.150890+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49744 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:16.150890+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49744 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:18.881889+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49745 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:18.881889+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49745 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:21.331321+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49746 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:21.331321+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49746 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:23.681578+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49748 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:23.681578+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49748 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:26.068195+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49749 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:26.068195+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49749 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:28.216458+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49750 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:28.216458+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49750 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:30.304462+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49751 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:30.304462+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49751 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:32.217567+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49752 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:32.217567+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49752 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:34.028917+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49753 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:34.028917+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49753 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:36.745552+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49754 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:36.745552+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49754 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:39.502585+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49755 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:39.502585+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49755 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:42.221169+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49756 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:42.221169+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49756 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:44.814720+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49757 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:44.814720+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49757 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:47.383667+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49758 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:47.383667+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49758 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:50.000424+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49759 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:50.000424+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49759 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:52.595955+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49760 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:52.595955+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49760 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:55.159262+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49761 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:55.159262+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49761 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:57.830323+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49762 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:13:57.830323+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49762 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:00.642413+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49763 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:00.642413+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49763 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:03.457497+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49764 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:03.457497+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49764 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:06.125665+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49765 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:06.125665+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49765 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:09.762628+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49766 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:09.762628+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49766 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:12.452093+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49767 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:12.452093+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49767 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:15.103461+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49768 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:15.103461+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49768 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:18.591925+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49769 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:18.591925+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49769 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:21.212318+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49770 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:21.212318+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49770 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:23.881920+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49771 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:23.881920+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49771 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:26.835180+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49772 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:26.835180+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49772 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:31.371483+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49773 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:31.371483+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49773 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:33.676398+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49774 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:33.676398+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49774 | 3.67.15.169 | 15408 | TCP |
2025-03-11T22:14:37.183178+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49775 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:37.183178+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49775 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:40.601098+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49776 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:40.601098+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49776 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:44.770637+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49777 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:44.770637+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49777 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:53.392647+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49778 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:53.392647+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49778 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:56.147054+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49779 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:56.147054+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49779 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:58.981079+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49780 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:14:58.981079+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49780 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:02.331049+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49781 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:02.331049+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49781 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:05.029814+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49782 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:05.029814+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49782 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:08.366304+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49783 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:08.366304+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49783 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:11.026844+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49784 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:11.026844+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49784 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:16.735726+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49785 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:16.735726+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49785 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:18.871089+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49786 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:18.871089+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49786 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:21.506700+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49787 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:21.506700+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49787 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:49.916215+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49788 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:49.916215+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49788 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:52.003121+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49789 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:52.003121+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49789 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:54.581613+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49790 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:54.581613+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49790 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:58.164615+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49791 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:15:58.164615+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49791 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:10.483002+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49792 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:10.483002+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49792 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:26.502895+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49793 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:26.502895+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49793 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:32.419279+0100 | 2033132 | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) | 1 | 192.168.2.4 | 49794 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:32.419279+0100 | 2021176 | ET MALWARE Bladabindi/njRAT CnC Command (ll) | 1 | 192.168.2.4 | 49794 | 3.125.188.168 | 15408 | TCP |
2025-03-11T22:16:32.736959+0100 | 2825564 | ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) | 1 | 192.168.2.4 | 49794 | 3.125.188.168 | 15408 | TCP |
- Total Packets: 59
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 11, 2025 22:12:35.974628925 CET | 49726 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:35.979341984 CET | 15408 | 49726 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:35.979448080 CET | 49726 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:36.546452999 CET | 15408 | 49726 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:36.549830914 CET | 49726 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:37.241180897 CET | 49726 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:37.246001959 CET | 15408 | 49726 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:39.487375975 CET | 49728 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:39.492120981 CET | 15408 | 49728 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:39.492264032 CET | 49728 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:39.492734909 CET | 49728 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:39.497436047 CET | 15408 | 49728 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:39.497555017 CET | 49728 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:39.502319098 CET | 15408 | 49728 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:40.043623924 CET | 15408 | 49728 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:40.043731928 CET | 49728 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:42.058726072 CET | 49728 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:42.060137987 CET | 49729 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:42.063484907 CET | 15408 | 49728 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:42.064825058 CET | 15408 | 49729 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:42.067828894 CET | 49729 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:42.068816900 CET | 49729 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:42.073446035 CET | 15408 | 49729 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:42.073532104 CET | 49729 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:42.078222036 CET | 15408 | 49729 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:42.633752108 CET | 15408 | 49729 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:42.633869886 CET | 49729 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:44.636852980 CET | 49729 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:44.641545057 CET | 15408 | 49729 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:44.753618956 CET | 49731 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:44.758584976 CET | 15408 | 49731 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:44.758661032 CET | 49731 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:44.766529083 CET | 49731 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:44.771235943 CET | 15408 | 49731 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:44.771281004 CET | 49731 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:44.775965929 CET | 15408 | 49731 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:44.858941078 CET | 49731 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:44.863665104 CET | 15408 | 49731 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:45.327251911 CET | 15408 | 49731 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:45.327342033 CET | 49731 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:47.340168953 CET | 49731 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:47.341068029 CET | 49732 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:47.344923973 CET | 15408 | 49731 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:47.345746040 CET | 15408 | 49732 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:47.345880985 CET | 49732 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:47.346311092 CET | 49732 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:47.350985050 CET | 15408 | 49732 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:47.351788044 CET | 49732 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:47.356436968 CET | 15408 | 49732 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:47.930116892 CET | 15408 | 49732 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:47.930183887 CET | 49732 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:49.938163996 CET | 49732 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:49.939263105 CET | 49733 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:49.942909956 CET | 15408 | 49732 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:49.943969011 CET | 15408 | 49733 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:49.944056988 CET | 49733 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:49.944664955 CET | 49733 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:49.949345112 CET | 15408 | 49733 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:49.949439049 CET | 49733 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:49.954662085 CET | 15408 | 49733 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:50.506661892 CET | 15408 | 49733 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:50.506894112 CET | 49733 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:52.514812946 CET | 49733 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:52.519606113 CET | 15408 | 49733 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:52.526856899 CET | 49735 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:52.531646013 CET | 15408 | 49735 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:52.531732082 CET | 49735 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:52.532541037 CET | 49735 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:52.537241936 CET | 15408 | 49735 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:52.537301064 CET | 49735 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:52.542013884 CET | 15408 | 49735 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:53.089138985 CET | 15408 | 49735 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:53.089795113 CET | 49735 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:55.105781078 CET | 49735 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:55.106956959 CET | 49736 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:55.111921072 CET | 15408 | 49735 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:55.112706900 CET | 15408 | 49736 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:55.112777948 CET | 49736 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:55.113465071 CET | 49736 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:55.118863106 CET | 15408 | 49736 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:55.118913889 CET | 49736 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:55.124972105 CET | 15408 | 49736 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:55.483630896 CET | 49736 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:55.488432884 CET | 15408 | 49736 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:55.702640057 CET | 15408 | 49736 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:55.702718019 CET | 49736 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:57.714986086 CET | 49736 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:57.719665051 CET | 15408 | 49736 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:57.766833067 CET | 49737 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:57.771651030 CET | 15408 | 49737 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:57.771811008 CET | 49737 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:57.774873018 CET | 49737 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:57.779707909 CET | 15408 | 49737 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:57.779763937 CET | 49737 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:12:57.784394979 CET | 15408 | 49737 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:58.324326038 CET | 15408 | 49737 | 3.67.15.169 | 192.168.2.4 |
Mar 11, 2025 22:12:58.324394941 CET | 49737 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:13:00.339946032 CET | 49737 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:13:00.340859890 CET | 49738 | 15408 | 192.168.2.4 | 3.67.15.169 |
Mar 11, 2025 22:13:00.344686031 CET | 15408 | 49737 | 3.67.15.169 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 11, 2025 22:12:35.958731890 CET | 51901 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 11, 2025 22:12:35.968116045 CET | 53 | 51901 | 1.1.1.1 | 192.168.2.4 |
Mar 11, 2025 22:13:36.637511969 CET | 62088 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 11, 2025 22:13:36.655838013 CET | 53 | 62088 | 1.1.1.1 | 192.168.2.4 |
Mar 11, 2025 22:14:36.629153013 CET | 64846 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 11, 2025 22:14:36.647820950 CET | 53 | 64846 | 1.1.1.1 | 192.168.2.4 |
Mar 11, 2025 22:15:44.230905056 CET | 54431 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 11, 2025 22:15:44.249380112 CET | 53 | 54431 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 11, 2025 22:12:35.958731890 CET | 192.168.2.4 | 1.1.1.1 | 0x8550 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 11, 2025 22:13:36.637511969 CET | 192.168.2.4 | 1.1.1.1 | 0xaf3e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 11, 2025 22:14:36.629153013 CET | 192.168.2.4 | 1.1.1.1 | 0x6550 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 11, 2025 22:15:44.230905056 CET | 192.168.2.4 | 1.1.1.1 | 0x98e2 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 11, 2025 22:12:35.968116045 CET | 1.1.1.1 | 192.168.2.4 | 0x8550 | No error (0) | 3.67.15.169 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 22:13:36.655838013 CET | 1.1.1.1 | 192.168.2.4 | 0xaf3e | No error (0) | 3.67.15.169 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 22:14:36.647820950 CET | 1.1.1.1 | 192.168.2.4 | 0x6550 | No error (0) | 3.125.188.168 | A (IP address) | IN (0x0001) | false | ||
Mar 11, 2025 22:15:44.249380112 CET | 1.1.1.1 | 192.168.2.4 | 0x98e2 | No error (0) | 3.125.188.168 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Target ID: | 0 |
Start time: | 17:12:26 |
Start date: | 11/03/2025 |
Path: | C:\Users\user\Desktop\pkFIMBYMWr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x700000 |
File size: | 95'232 bytes |
MD5 hash: | 769CC0701DDB3B77485187F4CFB89F53 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 17:12:28 |
Start date: | 11/03/2025 |
Path: | C:\Windows\server.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa60000 |
File size: | 95'232 bytes |
MD5 hash: | 769CC0701DDB3B77485187F4CFB89F53 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 17:12:30 |
Start date: | 11/03/2025 |
Path: | C:\Windows\SysWOW64\netsh.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe30000 |
File size: | 82'432 bytes |
MD5 hash: | 4E89A1A088BE715D6C946E55AB07C7DF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 17:12:30 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 17:12:32 |
Start date: | 11/03/2025 |
Path: | C:\Windows\SysWOW64\netsh.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe30000 |
File size: | 82'432 bytes |
MD5 hash: | 4E89A1A088BE715D6C946E55AB07C7DF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 17:12:32 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 17:12:32 |
Start date: | 11/03/2025 |
Path: | C:\Windows\SysWOW64\netsh.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe30000 |
File size: | 82'432 bytes |
MD5 hash: | 4E89A1A088BE715D6C946E55AB07C7DF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 17:12:33 |
Start date: | 11/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff62fc20000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 17:12:44 |
Start date: | 11/03/2025 |
Path: | C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0db0e27f45963af1d9fd7ae9a9419dc1Windows Update.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x420000 |
File size: | 95'232 bytes |
MD5 hash: | 769CC0701DDB3B77485187F4CFB89F53 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 12 |
Start time: | 17:12:45 |
Start date: | 11/03/2025 |
Path: | C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0db0e27f45963af1d9fd7ae9a9419dc1Windows Update.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 95'232 bytes |
MD5 hash: | 769CC0701DDB3B77485187F4CFB89F53 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 13 |
Start time: | 17:12:53 |
Start date: | 11/03/2025 |
Path: | C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\krnl-fixer268.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xaf0000 |
File size: | 95'232 bytes |
MD5 hash: | 769CC0701DDB3B77485187F4CFB89F53 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |