Edit tour
Windows
Analysis Report
XIiRHEaA9R.exe
Overview
General Information
Detection
Quasar
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Quasar RAT
Snort IDS alert for network traffic
.NET source code references suspicious native API functions
Machine Learning detection for sample
May check the online IP address of the machine
Yara detected Generic Downloader
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Classification
- System is w10x64
- XIiRHEaA9R.exe (PID: 4204 cmdline:
C:\Users\u ser\Deskto p\XIiRHEaA 9R.exe MD5: 7BE93D4CD0AE4D9E467C354E87D02DD0)
- XIiRHEaA9R.exe (PID: 3124 cmdline:
"C:\Users\ user\Deskt op\XIiRHEa A9R.exe" MD5: 7BE93D4CD0AE4D9E467C354E87D02DD0)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Vermin_Keylogger_Jan18_1 | Detects Vermin Keylogger | Florian Roth |
| |
xRAT_1 | Detects Patchwork malware | Florian Roth |
| |
Quasar_RAT_1 | Detects Quasar RAT | Florian Roth |
| |
Quasar_RAT_2 | Detects Quasar RAT | Florian Roth |
| |
CN_disclosed_20180208_KeyLogger_1 | Detects malware from disclosed CN malware set | Florian Roth |
| |
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Quasar_RAT_1 | Detects Quasar RAT | Florian Roth |
| |
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
Windows_Trojan_Quasarrat_e52df647 | unknown | unknown |
| |
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Vermin_Keylogger_Jan18_1 | Detects Vermin Keylogger | Florian Roth |
| |
xRAT_1 | Detects Patchwork malware | Florian Roth |
| |
Quasar_RAT_1 | Detects Quasar RAT | Florian Roth |
| |
Quasar_RAT_2 | Detects Quasar RAT | Florian Roth |
| |
CN_disclosed_20180208_KeyLogger_1 | Detects malware from disclosed CN malware set | Florian Roth |
| |
Click to see the 5 entries |
⊘No Sigma rule has matched
Timestamp: | 192.168.2.3104.26.15.7349700802814030 10/27/22-13:22:05.740946 |
SID: | 2814030 |
Source Port: | 49700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.388.198.193.21349697802814031 10/27/22-13:22:05.495329 |
SID: | 2814031 |
Source Port: | 49697 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Avira: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: |
Source: | File source: | ||
Source: | File source: |
Source: | ASN Name: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_05A50DB8 | |
Source: | Code function: | 0_2_0620BEA0 | |
Source: | Code function: | 0_2_0620AD80 | |
Source: | Code function: | 0_2_0620E2ED | |
Source: | Code function: | 0_2_06204BA0 | |
Source: | Code function: | 0_2_06204B9A | |
Source: | Code function: | 0_2_06203078 | |
Source: | Code function: | 1_2_04BCEDD0 | |
Source: | Code function: | 1_2_04BCF6A0 | |
Source: | Code function: | 1_2_04BCEA88 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Static file information: | |||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Mutant created: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_0620897C | |
Source: | Code function: | 0_2_066C2B70 | |
Source: | Code function: | 0_2_066C2B7A | |
Source: | Code function: | 0_2_066C2B48 | |
Source: | Code function: | 0_2_066C2B52 | |
Source: | Code function: | 0_2_066C2B3E | |
Source: | Code function: | 0_2_066C2B34 | |
Source: | Code function: | 0_2_066C2B20 | |
Source: | Code function: | 0_2_066C2B16 | |
Source: | Code function: | 0_2_066C2BE8 | |
Source: | Code function: | 0_2_066C2BCA | |
Source: | Code function: | 0_2_066C2BDE | |
Source: | Code function: | 0_2_066C2BA2 | |
Source: | Code function: | 0_2_066C2BC0 | |
Source: | Code function: | 0_2_066C2BB6 | |
Source: | Code function: | 0_2_066C2B8E | |
Source: | Code function: | 0_2_066C2B98 | |
Source: | Code function: | 0_2_066C2C06 | |
Source: | Code function: | 1_2_04BC8E01 | |
Source: | Code function: | 1_2_04BC1DA9 |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 111 Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 11 Security Software Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 31 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Non-Standard Port | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 31 Virtualization/Sandbox Evasion | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 1 Ingress Tool Transfer | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Process Injection | NTDS | 1 Remote System Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 2 Non-Application Layer Protocol | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 Hidden Files and Directories | LSA Secrets | 1 System Network Configuration Discovery | SSH | Keylogging | Data Transfer Size Limits | 12 Application Layer Protocol | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | 11 Obfuscated Files or Information | Cached Domain Credentials | 113 System Information Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
80% | ReversingLabs | ByteCode-MSIL.Trojan.Tinclex | ||
68% | Virustotal | Browse | ||
100% | Avira | TR/Dropper.Gen | ||
100% | Joe Sandbox ML |
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | HEUR/AGEN.1235887 | Download File |
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.ipify.org.herokudns.com | 54.91.59.199 | true | false | unknown | |
telize.com | 88.198.193.213 | true | true | unknown | |
www.telize.com | 88.198.193.213 | true | true | unknown | |
e2.luyouxia.net | 123.99.198.201 | true | false | unknown | |
freegeoip.net | 104.26.15.73 | true | false | high | |
aa9064aa.e2.luyouxia.net | unknown | unknown | true | unknown | |
api.ipify.org | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown | |
true |
| unknown | |
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
54.91.59.199 | api.ipify.org.herokudns.com | United States | 14618 | AMAZON-AESUS | false | |
88.198.193.213 | telize.com | Germany | 24940 | HETZNER-ASDE | true | |
123.99.198.201 | e2.luyouxia.net | China | 58461 | CT-HANGZHOU-IDCNo288Fu-chunRoadCN | false | |
104.26.15.73 | freegeoip.net | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox Version: | 36.0.0 Rainbow Opal |
Analysis ID: | 731879 |
Start date and time: | 2022-10-27 13:21:11 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 49s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | XIiRHEaA9R.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@2/1@6/4 |
EGA Information: |
|
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 93.184.220.29, 8.241.126.249, 8.238.189.126, 8.238.88.254, 8.238.88.248, 8.238.85.126, 173.222.108.210, 173.222.108.226, 209.197.3.8
- Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, cs9.wac.phicdn.net, ocsp.digicert.com, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
13:22:09 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
54.91.59.199 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
api.ipify.org.herokudns.com | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
AMAZON-AESUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
HETZNER-ASDE | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
⊘No context
⊘No context
Process: | C:\Users\user\Desktop\XIiRHEaA9R.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 701 |
Entropy (8bit): | 5.333763980888323 |
Encrypted: | false |
SSDEEP: | 12:Q3La/hhkvoDLI4MWuCqDLI4MWuPk21q1KDLI4M9XKbbDLI4MWuPJKiUrRZ9I0ZKz:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pe |
MD5: | BA746AE3F262831576BFC85A583D459B |
SHA1: | 454EF29E0DF1C81CD890FAAC211FFFCDE6ED37A3 |
SHA-256: | 81F25A1B2B3AA48F1CA416DBDB0099493353B2A4EA667F688220A9E4D4355FC7 |
SHA-512: | 2AE73EC4CCAEAFF14761FB3F53A2F7E166CBB7B3FA3BFCEF58D8EFC7CA6BF545D8DD0223C28CAA2B6213651AE4DC048C2FD6E99F1841DCF8CAF240434AB621B1 |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 4.430172686905627 |
TrID: |
|
File name: | XIiRHEaA9R.exe |
File size: | 488396 |
MD5: | 7be93d4cd0ae4d9e467c354e87d02dd0 |
SHA1: | 8852ce4a69274193debac56979519e650a3358d3 |
SHA256: | 23733904b1979abe6be5aede5a1dfb125c65e13fb682136a1222da4a70d2cdee |
SHA512: | 9be6ed40c6e287feb306162e6dd63add623aabe0dd2a2b91e7d1ba097fb5d94cd2961e26c2c247990e6c62a767edca3089e34fe3ee488879d3d1f2aa5d7052e5 |
SSDEEP: | 6144:VwbrjkaZKt+pxSrNgx7KLHbRgKIiZAZjC419pCnnnnjnnn/Y1:i98YpxSrqZcM1 |
TLSH: | C4A46D2063E8872BD6EE0779E6740108C7F5D817F91AE7CB5F9070B86CA33959D026A7 |
File Content Preview: | MZ......................@...............................................!..L.!This 53170389cannot be run in DOS mode....$.......PE..L.....Uc................................. ........@.. ....................................@................................ |
Icon Hash: | 00828e8e8686b000 |
Entrypoint: | 0x44a70e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x635513D3 [Sun Oct 23 10:13:39 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x4a6b8 | 0x53 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x4c000 | 0x800 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x4e000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x48714 | 0x48800 | False | 0.5118399784482759 | data | 6.388309341102076 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x4c000 | 0x800 | 0x800 | False | 0.4013671875 | data | 4.701816115281701 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x4e000 | 0xc | 0x200 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_VERSION | 0x4c0a0 | 0x244 | data | ||
RT_MANIFEST | 0x4c2e8 | 0x478 | exported SGML document, Unicode text, UTF-8 (with BOM) text |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
192.168.2.3104.26.15.7349700802814030 10/27/22-13:22:05.740946 | TCP | 2814030 | ETPRO TROJAN W32/Quasar RAT Connectivity Check 2 | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
192.168.2.388.198.193.21349697802814031 10/27/22-13:22:05.495329 | TCP | 2814031 | ETPRO TROJAN W32/Quasar RAT Connectivity Check | 49697 | 80 | 192.168.2.3 | 88.198.193.213 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 27, 2022 13:22:05.464781046 CEST | 49697 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.486810923 CEST | 80 | 49697 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:05.487021923 CEST | 49697 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.495328903 CEST | 49697 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.517117977 CEST | 80 | 49697 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:05.517144918 CEST | 80 | 49697 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:05.546022892 CEST | 49698 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.567841053 CEST | 80 | 49698 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:05.568576097 CEST | 49698 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.568857908 CEST | 49698 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.569541931 CEST | 49697 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.590368986 CEST | 80 | 49698 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:05.590408087 CEST | 80 | 49698 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:05.590562105 CEST | 49698 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.611340046 CEST | 49698 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.612623930 CEST | 49699 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.632935047 CEST | 80 | 49698 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:05.634044886 CEST | 80 | 49699 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:05.634155989 CEST | 49699 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.634567976 CEST | 49699 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.656001091 CEST | 80 | 49699 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:05.656028032 CEST | 80 | 49699 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:05.656116962 CEST | 49699 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.656265974 CEST | 49699 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:05.678030968 CEST | 80 | 49699 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:05.723280907 CEST | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
Oct 27, 2022 13:22:05.740281105 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:05.740433931 CEST | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
Oct 27, 2022 13:22:05.740946054 CEST | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
Oct 27, 2022 13:22:05.757934093 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:05.774003029 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:05.775881052 CEST | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
Oct 27, 2022 13:22:05.792895079 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:05.815707922 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:05.815788984 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:05.815841913 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:05.815881014 CEST | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
Oct 27, 2022 13:22:05.866417885 CEST | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
Oct 27, 2022 13:22:05.896625996 CEST | 49701 | 80 | 192.168.2.3 | 54.91.59.199 |
Oct 27, 2022 13:22:06.035980940 CEST | 80 | 49701 | 54.91.59.199 | 192.168.2.3 |
Oct 27, 2022 13:22:06.036230087 CEST | 49701 | 80 | 192.168.2.3 | 54.91.59.199 |
Oct 27, 2022 13:22:06.037389994 CEST | 49701 | 80 | 192.168.2.3 | 54.91.59.199 |
Oct 27, 2022 13:22:06.176995039 CEST | 80 | 49701 | 54.91.59.199 | 192.168.2.3 |
Oct 27, 2022 13:22:06.183392048 CEST | 80 | 49701 | 54.91.59.199 | 192.168.2.3 |
Oct 27, 2022 13:22:06.183516979 CEST | 80 | 49701 | 54.91.59.199 | 192.168.2.3 |
Oct 27, 2022 13:22:06.183589935 CEST | 49701 | 80 | 192.168.2.3 | 54.91.59.199 |
Oct 27, 2022 13:22:06.884967089 CEST | 49702 | 24252 | 192.168.2.3 | 123.99.198.201 |
Oct 27, 2022 13:22:07.102647066 CEST | 24252 | 49702 | 123.99.198.201 | 192.168.2.3 |
Oct 27, 2022 13:22:07.102806091 CEST | 49702 | 24252 | 192.168.2.3 | 123.99.198.201 |
Oct 27, 2022 13:22:07.640811920 CEST | 24252 | 49702 | 123.99.198.201 | 192.168.2.3 |
Oct 27, 2022 13:22:07.694716930 CEST | 49702 | 24252 | 192.168.2.3 | 123.99.198.201 |
Oct 27, 2022 13:22:07.775280952 CEST | 49697 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.797174931 CEST | 80 | 49697 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:07.798336983 CEST | 49703 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.820265055 CEST | 80 | 49703 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:07.820466995 CEST | 49703 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.820914984 CEST | 49703 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.842683077 CEST | 80 | 49703 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:07.842706919 CEST | 80 | 49703 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:07.842956066 CEST | 49703 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.843089104 CEST | 49703 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.844166040 CEST | 49704 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.850963116 CEST | 49697 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.864898920 CEST | 80 | 49703 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:07.865947008 CEST | 80 | 49704 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:07.866040945 CEST | 49704 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.867060900 CEST | 49704 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.888860941 CEST | 80 | 49704 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:07.888892889 CEST | 80 | 49704 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:07.889061928 CEST | 49704 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.889619112 CEST | 49704 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:22:07.905378103 CEST | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
Oct 27, 2022 13:22:07.911545992 CEST | 80 | 49704 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:22:07.922312021 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:07.931761980 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:07.934763908 CEST | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
Oct 27, 2022 13:22:07.960078955 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:07.960108995 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:07.960122108 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:22:07.960551977 CEST | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
Oct 27, 2022 13:22:07.961554050 CEST | 49701 | 80 | 192.168.2.3 | 54.91.59.199 |
Oct 27, 2022 13:22:08.102243900 CEST | 80 | 49701 | 54.91.59.199 | 192.168.2.3 |
Oct 27, 2022 13:22:08.147989988 CEST | 49701 | 80 | 192.168.2.3 | 54.91.59.199 |
Oct 27, 2022 13:22:08.386555910 CEST | 49702 | 24252 | 192.168.2.3 | 123.99.198.201 |
Oct 27, 2022 13:22:08.809278011 CEST | 24252 | 49702 | 123.99.198.201 | 192.168.2.3 |
Oct 27, 2022 13:22:08.851190090 CEST | 49702 | 24252 | 192.168.2.3 | 123.99.198.201 |
Oct 27, 2022 13:22:33.821917057 CEST | 49702 | 24252 | 192.168.2.3 | 123.99.198.201 |
Oct 27, 2022 13:22:34.068227053 CEST | 24252 | 49702 | 123.99.198.201 | 192.168.2.3 |
Oct 27, 2022 13:22:59.074217081 CEST | 49702 | 24252 | 192.168.2.3 | 123.99.198.201 |
Oct 27, 2022 13:22:59.321309090 CEST | 24252 | 49702 | 123.99.198.201 | 192.168.2.3 |
Oct 27, 2022 13:23:08.103003025 CEST | 80 | 49701 | 54.91.59.199 | 192.168.2.3 |
Oct 27, 2022 13:23:08.103163958 CEST | 49701 | 80 | 192.168.2.3 | 54.91.59.199 |
Oct 27, 2022 13:23:22.797566891 CEST | 80 | 49697 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:23:22.797732115 CEST | 49697 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:23:24.326200008 CEST | 49702 | 24252 | 192.168.2.3 | 123.99.198.201 |
Oct 27, 2022 13:23:24.572607994 CEST | 24252 | 49702 | 123.99.198.201 | 192.168.2.3 |
Oct 27, 2022 13:23:47.798899889 CEST | 49697 | 80 | 192.168.2.3 | 88.198.193.213 |
Oct 27, 2022 13:23:47.820641041 CEST | 80 | 49697 | 88.198.193.213 | 192.168.2.3 |
Oct 27, 2022 13:23:48.000494957 CEST | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
Oct 27, 2022 13:23:48.018194914 CEST | 80 | 49700 | 104.26.15.73 | 192.168.2.3 |
Oct 27, 2022 13:23:48.018402100 CEST | 49700 | 80 | 192.168.2.3 | 104.26.15.73 |
Oct 27, 2022 13:23:48.143403053 CEST | 49701 | 80 | 192.168.2.3 | 54.91.59.199 |
Oct 27, 2022 13:23:48.281968117 CEST | 80 | 49701 | 54.91.59.199 | 192.168.2.3 |
Oct 27, 2022 13:23:49.578408957 CEST | 49702 | 24252 | 192.168.2.3 | 123.99.198.201 |
Oct 27, 2022 13:23:49.824837923 CEST | 24252 | 49702 | 123.99.198.201 | 192.168.2.3 |
Oct 27, 2022 13:24:14.846159935 CEST | 49702 | 24252 | 192.168.2.3 | 123.99.198.201 |
Oct 27, 2022 13:24:15.104890108 CEST | 24252 | 49702 | 123.99.198.201 | 192.168.2.3 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 27, 2022 13:22:05.413897991 CEST | 62704 | 53 | 192.168.2.3 | 8.8.8.8 |
Oct 27, 2022 13:22:05.442637920 CEST | 53 | 62704 | 8.8.8.8 | 192.168.2.3 |
Oct 27, 2022 13:22:05.525307894 CEST | 49977 | 53 | 192.168.2.3 | 8.8.8.8 |
Oct 27, 2022 13:22:05.544632912 CEST | 53 | 49977 | 8.8.8.8 | 192.168.2.3 |
Oct 27, 2022 13:22:05.698283911 CEST | 57840 | 53 | 192.168.2.3 | 8.8.8.8 |
Oct 27, 2022 13:22:05.721601009 CEST | 53 | 57840 | 8.8.8.8 | 192.168.2.3 |
Oct 27, 2022 13:22:05.845635891 CEST | 57990 | 53 | 192.168.2.3 | 8.8.8.8 |
Oct 27, 2022 13:22:05.864444971 CEST | 53 | 57990 | 8.8.8.8 | 192.168.2.3 |
Oct 27, 2022 13:22:05.875752926 CEST | 52387 | 53 | 192.168.2.3 | 8.8.8.8 |
Oct 27, 2022 13:22:05.894567013 CEST | 53 | 52387 | 8.8.8.8 | 192.168.2.3 |
Oct 27, 2022 13:22:06.774370909 CEST | 56924 | 53 | 192.168.2.3 | 8.8.8.8 |
Oct 27, 2022 13:22:06.882405043 CEST | 53 | 56924 | 8.8.8.8 | 192.168.2.3 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 27, 2022 13:22:05.413897991 CEST | 192.168.2.3 | 8.8.8.8 | 0x7566 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 27, 2022 13:22:05.525307894 CEST | 192.168.2.3 | 8.8.8.8 | 0x491b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 27, 2022 13:22:05.698283911 CEST | 192.168.2.3 | 8.8.8.8 | 0x263c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 27, 2022 13:22:05.845635891 CEST | 192.168.2.3 | 8.8.8.8 | 0x9712 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 27, 2022 13:22:05.875752926 CEST | 192.168.2.3 | 8.8.8.8 | 0x96b6 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 27, 2022 13:22:06.774370909 CEST | 192.168.2.3 | 8.8.8.8 | 0xfa59 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 27, 2022 13:22:05.442637920 CEST | 8.8.8.8 | 192.168.2.3 | 0x7566 | No error (0) | 88.198.193.213 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.544632912 CEST | 8.8.8.8 | 192.168.2.3 | 0x491b | No error (0) | 88.198.193.213 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.721601009 CEST | 8.8.8.8 | 192.168.2.3 | 0x263c | No error (0) | 104.26.15.73 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.721601009 CEST | 8.8.8.8 | 192.168.2.3 | 0x263c | No error (0) | 172.67.75.176 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.721601009 CEST | 8.8.8.8 | 192.168.2.3 | 0x263c | No error (0) | 104.26.14.73 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.864444971 CEST | 8.8.8.8 | 192.168.2.3 | 0x9712 | No error (0) | api.ipify.org.herokudns.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.864444971 CEST | 8.8.8.8 | 192.168.2.3 | 0x9712 | No error (0) | 54.91.59.199 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.864444971 CEST | 8.8.8.8 | 192.168.2.3 | 0x9712 | No error (0) | 3.220.57.224 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.864444971 CEST | 8.8.8.8 | 192.168.2.3 | 0x9712 | No error (0) | 52.20.78.240 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.864444971 CEST | 8.8.8.8 | 192.168.2.3 | 0x9712 | No error (0) | 3.232.242.170 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.894567013 CEST | 8.8.8.8 | 192.168.2.3 | 0x96b6 | No error (0) | api.ipify.org.herokudns.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.894567013 CEST | 8.8.8.8 | 192.168.2.3 | 0x96b6 | No error (0) | 3.232.242.170 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.894567013 CEST | 8.8.8.8 | 192.168.2.3 | 0x96b6 | No error (0) | 3.220.57.224 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.894567013 CEST | 8.8.8.8 | 192.168.2.3 | 0x96b6 | No error (0) | 54.91.59.199 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:05.894567013 CEST | 8.8.8.8 | 192.168.2.3 | 0x96b6 | No error (0) | 52.20.78.240 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:06.882405043 CEST | 8.8.8.8 | 192.168.2.3 | 0xfa59 | No error (0) | e2.luyouxia.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:06.882405043 CEST | 8.8.8.8 | 192.168.2.3 | 0xfa59 | No error (0) | 123.99.198.201 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:06.882405043 CEST | 8.8.8.8 | 192.168.2.3 | 0xfa59 | No error (0) | 43.248.129.34 | A (IP address) | IN (0x0001) | false | ||
Oct 27, 2022 13:22:06.882405043 CEST | 8.8.8.8 | 192.168.2.3 | 0xfa59 | No error (0) | 180.97.221.120 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49697 | 88.198.193.213 | 80 | C:\Users\user\Desktop\XIiRHEaA9R.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Oct 27, 2022 13:22:05.495328903 CEST | 137 | OUT | |
Oct 27, 2022 13:22:05.517144918 CEST | 137 | IN | |
Oct 27, 2022 13:22:07.775280952 CEST | 144 | OUT | |
Oct 27, 2022 13:22:07.797174931 CEST | 144 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.3 | 49698 | 88.198.193.213 | 80 | C:\Users\user\Desktop\XIiRHEaA9R.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Oct 27, 2022 13:22:05.568857908 CEST | 138 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
2 | 192.168.2.3 | 49699 | 88.198.193.213 | 80 | C:\Users\user\Desktop\XIiRHEaA9R.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Oct 27, 2022 13:22:05.634567976 CEST | 138 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
3 | 192.168.2.3 | 49700 | 104.26.15.73 | 80 | C:\Users\user\Desktop\XIiRHEaA9R.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Oct 27, 2022 13:22:05.740946054 CEST | 139 | OUT | |
Oct 27, 2022 13:22:05.774003029 CEST | 140 | IN | |
Oct 27, 2022 13:22:05.775881052 CEST | 140 | OUT | |
Oct 27, 2022 13:22:05.815707922 CEST | 141 | IN |