Source: https://sector-essay.cyou/api |
Avira URL Cloud: Label: malware |
Source: https://sector-essay.cyou/apij |
Avira URL Cloud: Label: malware |
Source: http://147.45.44.131/infopage/tvh53.exe |
Avira URL Cloud: Label: malware |
Source: https://sector-essay.cyou/5 |
Avira URL Cloud: Label: malware |
Source: https://sector-essay.cyou/apiO |
Avira URL Cloud: Label: malware |
Source: https://sector-essay.cyou/apiC |
Avira URL Cloud: Label: malware |
Source: https://sector-essay.cyou/ |
Avira URL Cloud: Label: malware |
Source: https://sector-essay.cyou:443/apiMicrosoft |
Avira URL Cloud: Label: malware |
Source: https://sector-essay.cyou/apie |
Avira URL Cloud: Label: malware |
Source: https://sector-essay.cyou:443/api |
Avira URL Cloud: Label: malware |
Source: 00000005.00000002.2267116955.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String decryptor: faintbl0w.sbs |
Source: 00000005.00000002.2267116955.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String decryptor: 300snails.sbs |
Source: 00000005.00000002.2267116955.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String decryptor: 3xc1aimbl0w.sbs |
Source: 00000005.00000002.2267116955.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String decryptor: thicktoys.sbs |
Source: 00000005.00000002.2267116955.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 00000005.00000002.2267116955.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String decryptor: TeslaBrowser/5.5 |
Source: 00000005.00000002.2267116955.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String decryptor: - Screen Resoluton: |
Source: 00000005.00000002.2267116955.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String decryptor: - Physical Installed Memory: |
Source: 00000005.00000002.2267116955.0000000000400000.00000040.00000400.00020000.00000000.sdmp |
String decryptor: Workgroup: - |
Source: unknown |
HTTPS traffic detected: 104.21.47.136:443 -> 192.168.2.5:49705 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.47.136:443 -> 192.168.2.5:49706 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.47.136:443 -> 192.168.2.5:49707 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.47.136:443 -> 192.168.2.5:49708 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.47.136:443 -> 192.168.2.5:49709 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.47.136:443 -> 192.168.2.5:49710 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.47.136:443 -> 192.168.2.5:49711 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.47.136:443 -> 192.168.2.5:49722 version: TLS 1.2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then cmp dword ptr [edi+edx*8], 4C697C35h |
5_2_00441050 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov byte ptr [edx], al |
5_2_0042E3BE |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx ecx, byte ptr [esp+eax] |
5_2_00441480 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx edi, byte ptr [esp+edx+000000E8h] |
5_2_0040E4AF |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx edi, byte ptr [esp+eax-0CA2BA0Eh] |
5_2_0040CDB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx ecx, byte ptr [esp+esi+04h] |
5_2_00423850 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx esi, byte ptr [esp+eax-2FEE79D7h] |
5_2_0040D80D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov byte ptr [edi], cl |
5_2_0042C81E |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov dword ptr [esi+04h], eax |
5_2_0042E03F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then cmp dword ptr [ebx+edi*8], 1B6183F2h |
5_2_004268D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov word ptr [ebx], dx |
5_2_00418890 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx edi, byte ptr [esp+eax+000001ADh] |
5_2_0041990C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx edx, byte ptr [esi+ecx+5F30FA22h] |
5_2_0040B1D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then jmp eax |
5_2_004251D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then cmp dword ptr [edi+edx*8], 4C697C35h |
5_2_004411E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov byte ptr [edi], bl |
5_2_004091B0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movsx eax, byte ptr [esi] |
5_2_00440210 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov ebx, edx |
5_2_0041C225 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movsx eax, byte ptr [esi] |
5_2_004402F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov ecx, eax |
5_2_0041D330 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx eax, byte ptr [esi+edx+00000420h] |
5_2_0042C3D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov byte ptr [ebx], dl |
5_2_0042C3D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx edx, byte ptr [esp+ecx-5B418B08h] |
5_2_0043C3D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then cmp dword ptr [esi+edx*8], 98D5A07Fh |
5_2_0043C3D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov ecx, eax |
5_2_0041EB80 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov word ptr [esi], ax |
5_2_0041EB80 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov word ptr [esi], ax |
5_2_0041EB80 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx edx, byte ptr [esp+eax-42FFC5DBh] |
5_2_0040D392 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then jmp eax |
5_2_00425440 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx ebx, byte ptr [edx] |
5_2_00435CC0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov ebx, dword ptr [edi+04h] |
5_2_0042B4E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov ecx, eax |
5_2_00426C90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov dword ptr [esi+04h], eax |
5_2_0042ED09 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx edx, byte ptr [eax+ecx] |
5_2_0040AD20 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov dword ptr [esi+04h], eax |
5_2_0042EDCA |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then jmp eax |
5_2_004255D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx eax, byte ptr [edi] |
5_2_0043FDE0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movsx eax, byte ptr [esi] |
5_2_0043FDE0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h |
5_2_004235F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov dword ptr [ebp-10h], edx |
5_2_00424DA1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx ebx, bx |
5_2_004255A4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then cmp dword ptr [ebx+edi*8], 32F24C0Bh |
5_2_0043BE60 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx edi, byte ptr [esp+eax-7269D38Fh] |
5_2_00418E83 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then jmp dword ptr [00446898h] |
5_2_00419744 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov dword ptr [ecx], edi |
5_2_0040B769 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then cmp dword ptr [ecx+ebx*8], 9C142CDAh |
5_2_00440F70 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then movzx edx, word ptr [eax] |
5_2_00441720 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov ebx, ecx |
5_2_004077D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov byte ptr [edi], al |
5_2_0041FF90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then mov edx, ecx |
5_2_0040C795 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 4x nop then cmp dword ptr [ebx+edi*8], 1B6183F2h |
5_2_0043BFA0 |
Source: Network traffic |
Suricata IDS: 2057670 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sector-essay .cyou) : 192.168.2.5:61746 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2057671 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sector-essay .cyou in TLS SNI) : 192.168.2.5:49711 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2057671 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sector-essay .cyou in TLS SNI) : 192.168.2.5:49710 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2057671 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sector-essay .cyou in TLS SNI) : 192.168.2.5:49705 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2057671 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sector-essay .cyou in TLS SNI) : 192.168.2.5:49709 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2057671 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sector-essay .cyou in TLS SNI) : 192.168.2.5:49706 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2057671 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sector-essay .cyou in TLS SNI) : 192.168.2.5:49708 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2057671 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sector-essay .cyou in TLS SNI) : 192.168.2.5:49722 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2057671 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (sector-essay .cyou in TLS SNI) : 192.168.2.5:49707 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49705 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49706 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49710 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.5:49711 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49722 -> 104.21.47.136:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49706 -> 104.21.47.136:443 |