Windows
Analysis Report
2mtls.exe
Overview
General Information
Detection
Score: | 68 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
2mtls.exe (PID: 6284 cmdline:
"C:\Users\ user\Deskt op\2mtls.e xe" MD5: 17AF646CFBB7FCFE4F0F6DBCFC2E31DD)
cmd.exe (PID: 2024 cmdline:
"C:\Window s\system32 \cmd.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 5464 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) 2mtls.exe (PID: 4732 cmdline:
2mtls.exe MD5: 17AF646CFBB7FCFE4F0F6DBCFC2E31DD) 2mtls.exe (PID: 3928 cmdline:
2mtls.exe /? MD5: 17AF646CFBB7FCFE4F0F6DBCFC2E31DD) 2mtls.exe (PID: 4916 cmdline:
2mtls.exe -? MD5: 17AF646CFBB7FCFE4F0F6DBCFC2E31DD)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Sliver | According to VK9 Seecurity, Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server. Sliver supports multiple callback protocols including DNS, TCP, and HTTP(S) to make egress simple, even when those pesky blue teams block your domains. You can even have multiple operators (players) simultaneously commanding your sliver army. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Sliver | Yara detected Sliver Implants | Joe Security | ||
Multi_Trojan_Bishopsliver_42298c4a | unknown | unknown |
| |
INDICATOR_TOOL_Sliver | Detects Sliver implant cross-platform adversary emulation/red team | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Sliver | Yara detected Sliver Implants | Joe Security | ||
JoeSecurity_Sliver | Yara detected Sliver Implants | Joe Security | ||
JoeSecurity_Sliver | Yara detected Sliver Implants | Joe Security | ||
JoeSecurity_Sliver | Yara detected Sliver Implants | Joe Security | ||
Multi_Trojan_Bishopsliver_42298c4a | unknown | unknown |
| |
Click to see the 4 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Multi_Trojan_Bishopsliver_42298c4a | unknown | unknown |
| |
INDICATOR_TOOL_Sliver | Detects Sliver implant cross-platform adversary emulation/red team | ditekSHen |
|
- • AV Detection
- • Compliance
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | Binary or memory string: | memstr_bbaebb25-c |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 11 Process Injection | 11 Input Capture | 1 Security Software Discovery | Remote Services | 11 Input Capture | 1 Non-Standard Port | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 DLL Side-Loading | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 12 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
71% | Virustotal | Browse | ||
58% | ReversingLabs | Win64.Trojan.SliverMarte |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
45.61.169.127 | unknown | United States | 8100 | ASN-QUADRANET-GLOBALUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1645394 |
Start date and time: | 2025-03-21 17:46:52 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 7s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 2mtls.exe |
Detection: | MAL |
Classification: | mal68.troj.winEXE@9/0@0/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, SIHClient.exe, Sgr mBroker.exe, backgroundTaskHos t.exe, conhost.exe, svchost.ex e - Excluded IPs from analysis (wh
itelisted): 20.109.210.53, 184 .31.69.3, 2.23.227.208, 204.79 .197.222, 150.171.29.254, 13.1 07.253.254 - Excluded domains from analysis
(whitelisted): www.bing.com, fp.msedge.net, fs.microsoft.co m, t-ring-fallback.msedge.net, slscr.update.microsoft.com, t -ring-fdv2.msedge.net, ax-ring -fallback.msedge.net, fe3cr.de livery.mp.microsoft.com - Not all processes where analyz
ed, report is missing behavior information
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
45.61.169.127 | Get hash | malicious | Sliver | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ASN-QUADRANET-GLOBALUS | Get hash | malicious | Sliver | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DarkTortilla, XWorm | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
File type: | |
Entropy (8bit): | 6.117190676288544 |
TrID: |
|
File name: | 2mtls.exe |
File size: | 15'661'568 bytes |
MD5: | 17af646cfbb7fcfe4f0f6dbcfc2e31dd |
SHA1: | 8f8423ec26ccb310950cfd30f705ea211ca5c237 |
SHA256: | a51690b6e1169a25bac4c016343ede9b47032e31e93508aa78f9499bec49ecb4 |
SHA512: | dfc0be3f522fbe8b08defa8c260bc94c8fe5fb006c17e3813f3d047c3c2e38afd5c75a0eb5e732782ae95728d9559145881bee93a11ee9b54ff14d7f476901c3 |
SSDEEP: | 98304:a3NEDxPmHdK08B4MATOkEtqr1KUREyTj4nCOe:aNMDB4MoOkEtqr1KUyyPJOe |
TLSH: | CCF60903E8962198C4EAD2B489214172F971785C1B7933DF2B61F7B42B727F08E7A791 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...........................@.............................. ............`... ............................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x45d0a0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x0 [Thu Jan 1 00:00:00 1970 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 1 |
File Version Major: | 6 |
File Version Minor: | 1 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 1 |
Import Hash: | f0ea7b7844bbc5bfa9bb32efdcea957c |
Instruction |
---|
jmp 00007F9B1881F680h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
pushfd |
cld |
dec eax |
sub esp, 000000E0h |
dec eax |
mov dword ptr [esp], edi |
dec eax |
mov dword ptr [esp+08h], esi |
dec eax |
mov dword ptr [esp+10h], ebp |
dec eax |
mov dword ptr [esp+18h], ebx |
dec esp |
mov dword ptr [esp+20h], esp |
dec esp |
mov dword ptr [esp+28h], ebp |
dec esp |
mov dword ptr [esp+30h], esi |
dec esp |
mov dword ptr [esp+38h], edi |
movups dqword ptr [esp+40h], xmm6 |
movups dqword ptr [esp+50h], xmm7 |
inc esp |
movups dqword ptr [esp+60h], xmm0 |
inc esp |
movups dqword ptr [esp+70h], xmm1 |
inc esp |
movups dqword ptr [esp+00000080h], xmm2 |
inc esp |
movups dqword ptr [esp+00000090h], xmm3 |
inc esp |
movups dqword ptr [esp+000000A0h], xmm4 |
inc esp |
movups dqword ptr [esp+000000B0h], xmm5 |
inc esp |
movups dqword ptr [esp+000000C0h], xmm6 |
inc esp |
movups dqword ptr [esp+000000D0h], xmm7 |
dec eax |
sub esp, 30h |
dec ecx |
mov ebp, ecx |
dec ecx |
mov edi, eax |
dec eax |
mov edx, dword ptr [00EC6B6Bh] |
dec eax |
mov edx, dword ptr [edx] |
dec eax |
cmp edx, 00000000h |
jne 00007F9B1882334Eh |
dec eax |
mov eax, 00000000h |
jmp 00007F9B18823413h |
dec eax |
mov edx, dword ptr [edx] |
dec eax |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xf38000 | 0x490 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xf39000 | 0x274ea | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xe88040 | 0x148 | .data |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x90bf8f | 0x90c000 | c6a8cc1e5eadb4a1e9e515990cb1e674 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x90d000 | 0x57a348 | 0x57a400 | 383de41ae1a10b3fd5c44c6c92544ab6 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xe88000 | 0xaf350 | 0x41200 | 4fba39db86a01676293316c950eb23fb | False | 0.38813954534548945 | data | 4.779334866566355 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xf38000 | 0x490 | 0x600 | 520ce628015e913ff43b204119edb209 | False | 0.3359375 | data | 3.6105306322353172 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0xf39000 | 0x274ea | 0x27600 | afe604a3d4b32f8e89794fe60821a75f | False | 0.14068700396825398 | data | 5.439219324617001 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.symtab | 0xf61000 | 0x4 | 0x200 | 07b5472d347d42780469fb2654b7fc54 | False | 0.02734375 | data | 0.020393135236084953 | IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
kernel32.dll | WriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler |
Download Network PCAP: filtered – full
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 21, 2025 17:47:29.254081964 CET | 49697 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:47:29.386987925 CET | 8443 | 49697 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:47:29.893747091 CET | 49697 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:47:30.024806023 CET | 8443 | 49697 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:47:30.534459114 CET | 49697 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:47:30.666887045 CET | 8443 | 49697 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:47:31.181773901 CET | 49697 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:47:31.317667007 CET | 8443 | 49697 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:47:31.832735062 CET | 49697 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:47:31.966953993 CET | 8443 | 49697 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:48:31.976988077 CET | 49705 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:32.981861115 CET | 49705 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:34.996768951 CET | 49705 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:36.455749035 CET | 8443 | 49705 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:48:36.957763910 CET | 49705 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:37.393513918 CET | 8443 | 49705 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:48:37.897746086 CET | 49705 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:40.244434118 CET | 8443 | 49705 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:48:48.679126978 CET | 49725 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:48.811469078 CET | 8443 | 49725 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:48:49.317517996 CET | 49725 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:49.448748112 CET | 8443 | 49725 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:48:49.955733061 CET | 49725 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:50.088466883 CET | 8443 | 49725 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:48:50.592578888 CET | 49725 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:50.726644039 CET | 8443 | 49725 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:48:51.231585026 CET | 49725 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:51.366413116 CET | 8443 | 49725 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:48:53.616662979 CET | 49726 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:54.627118111 CET | 49726 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:56.634968996 CET | 49726 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:57.809670925 CET | 8443 | 49726 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:48:58.312971115 CET | 49726 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:58.824978113 CET | 8443 | 49726 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:48:59.334995985 CET | 49726 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:48:59.440938950 CET | 49727 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:49:00.170594931 CET | 8443 | 49726 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:49:00.450754881 CET | 49727 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:49:00.583482027 CET | 8443 | 49727 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:49:01.089818954 CET | 49727 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:49:01.224437952 CET | 8443 | 49727 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:49:01.724798918 CET | 49727 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:49:01.856554985 CET | 8443 | 49727 | 45.61.169.127 | 192.168.2.16 |
Mar 21, 2025 17:49:02.364799023 CET | 49727 | 8443 | 192.168.2.16 | 45.61.169.127 |
Mar 21, 2025 17:49:02.498446941 CET | 8443 | 49727 | 45.61.169.127 | 192.168.2.16 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 21, 2025 17:48:42.570401907 CET | 53 | 64187 | 1.1.1.1 | 192.168.2.16 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 12:47:27 |
Start date: | 21/03/2025 |
Path: | C:\Users\user\Desktop\2mtls.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x660000 |
File size: | 15'661'568 bytes |
MD5 hash: | 17AF646CFBB7FCFE4F0F6DBCFC2E31DD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Go lang |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 10 |
Start time: | 12:48:38 |
Start date: | 21/03/2025 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7e7b10000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 12:48:38 |
Start date: | 21/03/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6aa7d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 12:48:47 |
Start date: | 21/03/2025 |
Path: | C:\Users\user\Desktop\2mtls.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x660000 |
File size: | 15'661'568 bytes |
MD5 hash: | 17AF646CFBB7FCFE4F0F6DBCFC2E31DD |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | Go lang |
Reputation: | low |
Has exited: | false |
Target ID: | 15 |
Start time: | 12:48:52 |
Start date: | 21/03/2025 |
Path: | C:\Users\user\Desktop\2mtls.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x660000 |
File size: | 15'661'568 bytes |
MD5 hash: | 17AF646CFBB7FCFE4F0F6DBCFC2E31DD |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | Go lang |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 16 |
Start time: | 12:48:58 |
Start date: | 21/03/2025 |
Path: | C:\Users\user\Desktop\2mtls.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x660000 |
File size: | 15'661'568 bytes |
MD5 hash: | 17AF646CFBB7FCFE4F0F6DBCFC2E31DD |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | Go lang |
Reputation: | low |
Has exited: | false |