Source: C:\Users\user\AppData\Local\Temp\1003144001\9eba8044e7.exe |
Avira: detection malicious, Label: TR/Crypt.TPM.Gen |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe |
Avira: detection malicious, Label: TR/Crypt.TPM.Gen |
Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe |
Avira: detection malicious, Label: TR/Crypt.TPM.Gen |
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe |
Avira: detection malicious, Label: TR/Crypt.TPM.Gen |
Source: C:\Users\user\AppData\Local\Temp\KOLH45MMED0OMDDRYHIG.exe |
Avira: detection malicious, Label: TR/Crypt.TPM.Gen |
Source: C:\Users\user\AppData\Local\Temp\7URDKE3CJSA37VV3INEEM0S4N1C.exe |
Avira: detection malicious, Label: TR/Crypt.TPM.Gen |
Source: C:\Users\user\AppData\Local\Temp\1003145001\1553f88169.exe |
Avira: detection malicious, Label: TR/Crypt.TPM.Gen |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49730 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49732 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49733 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49734 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49735 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49736 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49737 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49910 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49920 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49932 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49946 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49957 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49978 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49989 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49990 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50002 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50026 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50035 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50049 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50058 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50056 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50072 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50073 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50113 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50115 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50116 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50118 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50119 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50122 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50125 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:50126 version: TLS 1.2 |
Source: Network traffic |
Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.4:56920 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.4:61392 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.4:56160 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.4:61870 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057123 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (necklacedmny .store) : 192.168.2.4:57060 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49731 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49736 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49730 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49733 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49737 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49732 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49735 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49734 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2856147 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M3 : 192.168.2.4:49801 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.4:49817 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49854 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49870 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.4:51178 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.4:52094 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.4:59295 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.4:57952 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49903 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49910 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49920 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49932 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49939 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49946 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:49933 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49957 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.4:53957 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.4:50317 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.4:49332 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.4:49916 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49978 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49971 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49989 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:49991 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50002 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:50016 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50035 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50026 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50049 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50072 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50073 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50058 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:49990 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:50055 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50056 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:50100 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2057129 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crisiwarny .store) : 192.168.2.4:62871 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50116 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50113 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057131 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (presticitpo .store) : 192.168.2.4:52181 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057127 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fadehairucw .store) : 192.168.2.4:49457 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50119 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50118 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50115 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50127 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50125 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50122 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:50124 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2057124 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (necklacedmny .store in TLS SNI) : 192.168.2.4:50126 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50129 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057071 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (authorisev .site) : 192.168.2.4:54814 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057125 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (thumbystriw .store) : 192.168.2.4:62875 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50131 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50133 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50134 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50147 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50141 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50158 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50186 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50187 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50191 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50189 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50195 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:50179 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50197 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50198 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2057072 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (authorisev .site in TLS SNI) : 192.168.2.4:50194 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49731 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49736 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49737 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49910 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49910 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49920 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49920 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49932 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49978 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49978 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49989 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49989 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50073 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:50122 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50126 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50072 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:50131 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50158 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:50127 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50127 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:50125 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:50056 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:50186 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50186 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:50058 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:50115 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50115 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:50129 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50129 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50198 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:50197 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:50197 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:50187 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50187 -> 104.21.85.194:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:50113 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50113 -> 188.114.97.3:443 |