Windows
Analysis Report
tE3ZXBTP0B.exe
Overview
General Information
Sample name: | tE3ZXBTP0B.exerenamed because original name is a hash value |
Original sample name: | 6494baca6b375ea0e325947e94b20c9c3487b03c6ca1fe878c23662d4e547028.exe |
Analysis ID: | 1562432 |
MD5: | acf863dd1a3d9bea3677b677429e6963 |
SHA1: | 354c3a0cad99023988521d85cdfefb279cfdbbbc |
SHA256: | 6494baca6b375ea0e325947e94b20c9c3487b03c6ca1fe878c23662d4e547028 |
Tags: | 89-40-31-232AsyncRATexeuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- tE3ZXBTP0B.exe (PID: 7360 cmdline:
"C:\Users\ user\Deskt op\tE3ZXBT P0B.exe" MD5: ACF863DD1A3D9BEA3677B677429E6963)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["89.40.31.232"], "Port": 1717, "Aes key": "1717", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk", "Telegram Chatid": "793028759", "Version": "XWorm V5.6"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm_1 | Yara detected XWorm | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T15:36:17.264734+0100 | 2853685 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 149.154.167.220 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: |
Source: | URLs: |
Source: | DNS query: |
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Window created: | Jump to behavior |
Operating System Destruction |
---|
Source: | Process information set: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process Stats: |
Source: | Code function: | 0_2_00007FFD9B8B8EF2 | |
Source: | Code function: | 0_2_00007FFD9B8B0E00 | |
Source: | Code function: | 0_2_00007FFD9B8B8146 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Base64 encoded string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | 0_2_00007FFD9B8BA3CA | |
Source: | Code function: | 0_2_00007FFD9B8B00C1 |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 11 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | OS Credential Dumping | 1 Query Registry | Remote Services | 11 Archive Collected Data | 1 Web Service | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 131 Virtualization/Sandbox Evasion | LSASS Memory | 121 Security Software Discovery | Remote Desktop Protocol | 1 Clipboard Data | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Deobfuscate/Decode Files or Information | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Obfuscated Files or Information | NTDS | 131 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 2 Software Packing | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | 2 Non-Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | 13 Application Layer Protocol | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
76% | ReversingLabs | ByteCode-MSIL.Spyware.AsyncRAT | ||
100% | Avira | TR/Spy.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.telegram.org | 149.154.167.220 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
149.154.167.220 | api.telegram.org | United Kingdom | 62041 | TELEGRAMRU | false | |
89.40.31.232 | unknown | Romania | 35512 | TELEMEDIA-ASRO | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1562432 |
Start date and time: | 2024-11-25 15:35:10 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | tE3ZXBTP0B.exerenamed because original name is a hash value |
Original Sample Name: | 6494baca6b375ea0e325947e94b20c9c3487b03c6ca1fe878c23662d4e547028.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/0@1/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: tE3ZXBTP0B.exe
Time | Type | Description |
---|---|---|
09:36:16 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
149.154.167.220 | Get hash | malicious | AsyncRAT | Browse | ||
Get hash | malicious | DarkCloud | Browse | |||
Get hash | malicious | GuLoader, MassLogger RAT | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | DarkCloud | Browse | |||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | MassLogger RAT | Browse | |||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse | |||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse | |||
89.40.31.232 | Get hash | malicious | Azorult, GuLoader | Browse |
| |
Get hash | malicious | Azorult, GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
api.telegram.org | Get hash | malicious | AsyncRAT | Browse |
| |
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | AsyncRAT | Browse |
| |
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
TELEMEDIA-ASRO | Get hash | malicious | Azorult, GuLoader | Browse |
| |
Get hash | malicious | Azorult, GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, XWorm | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
|
File type: | |
Entropy (8bit): | 6.066045079873424 |
TrID: |
|
File name: | tE3ZXBTP0B.exe |
File size: | 76'800 bytes |
MD5: | acf863dd1a3d9bea3677b677429e6963 |
SHA1: | 354c3a0cad99023988521d85cdfefb279cfdbbbc |
SHA256: | 6494baca6b375ea0e325947e94b20c9c3487b03c6ca1fe878c23662d4e547028 |
SHA512: | 11d031bf38cc73149f28f910b662f794290f5d67a9c40f2392497afe47f7bc2d57a3893280868271de77e116cf172b95c9434ffcc4dbbab04e6794d3350b29a9 |
SSDEEP: | 1536:mj2knMmhKdS08aK+rgYkdQOV9bFejQ4HyLPnqo9OMwPvyif:mQTnDrGdQo9bFxYo9OtVf |
TLSH: | D2737D2837F60525F1FF6FF519F27222DB36B2236903E35F24C8029A5613A89CD516E6 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Pk.g................."...........A... ...`....@.. ....................................@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x4141be |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x671F6B50 [Mon Oct 28 10:45:36 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00232000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1416c | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x16000 | 0x4be | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x18000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x121c4 | 0x12200 | bcf7537795381bcd86ccb3993af2c113 | False | 0.6174434267241379 | data | 6.137577330086902 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x16000 | 0x4be | 0x600 | aa6623607586acf6251d7d3eab083948 | False | 0.3697916666666667 | data | 3.6949593603858335 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x18000 | 0xc | 0x200 | c85afa9a31cb63780333b2bb0d33c232 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x160a0 | 0x234 | data | 0.4698581560283688 | ||
RT_MANIFEST | 0x162d4 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5469387755102041 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T15:36:17.264734+0100 | 2853685 | ETPRO MALWARE Win32/XWorm Checkin via Telegram | 1 | 192.168.2.4 | 49730 | 149.154.167.220 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 15:36:14.564848900 CET | 49730 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 25, 2024 15:36:14.564884901 CET | 443 | 49730 | 149.154.167.220 | 192.168.2.4 |
Nov 25, 2024 15:36:14.564980984 CET | 49730 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 25, 2024 15:36:15.238092899 CET | 49730 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 25, 2024 15:36:15.238122940 CET | 443 | 49730 | 149.154.167.220 | 192.168.2.4 |
Nov 25, 2024 15:36:16.682580948 CET | 443 | 49730 | 149.154.167.220 | 192.168.2.4 |
Nov 25, 2024 15:36:16.682734966 CET | 49730 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 25, 2024 15:36:16.687453032 CET | 49730 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 25, 2024 15:36:16.687479973 CET | 443 | 49730 | 149.154.167.220 | 192.168.2.4 |
Nov 25, 2024 15:36:16.687776089 CET | 443 | 49730 | 149.154.167.220 | 192.168.2.4 |
Nov 25, 2024 15:36:16.731764078 CET | 49730 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 25, 2024 15:36:16.747380018 CET | 49730 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 25, 2024 15:36:16.791327000 CET | 443 | 49730 | 149.154.167.220 | 192.168.2.4 |
Nov 25, 2024 15:36:17.264786959 CET | 443 | 49730 | 149.154.167.220 | 192.168.2.4 |
Nov 25, 2024 15:36:17.264868975 CET | 443 | 49730 | 149.154.167.220 | 192.168.2.4 |
Nov 25, 2024 15:36:17.264933109 CET | 49730 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 25, 2024 15:36:17.277200937 CET | 49730 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 25, 2024 15:36:17.398477077 CET | 49731 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:36:17.528129101 CET | 1717 | 49731 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:36:17.528243065 CET | 49731 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:36:17.621371984 CET | 49731 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:36:17.750083923 CET | 1717 | 49731 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:36:30.533663034 CET | 49731 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:36:30.662691116 CET | 1717 | 49731 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:36:39.518556118 CET | 1717 | 49731 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:36:39.518800974 CET | 49731 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:36:40.075855017 CET | 49731 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:36:40.076877117 CET | 49738 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:36:40.210308075 CET | 1717 | 49731 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:36:40.210338116 CET | 1717 | 49738 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:36:40.210510969 CET | 49738 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:36:40.273092031 CET | 49738 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:36:40.404961109 CET | 1717 | 49738 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:36:51.138482094 CET | 49738 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:36:51.265723944 CET | 1717 | 49738 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:02.013585091 CET | 49738 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:02.188797951 CET | 1717 | 49738 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:02.188958883 CET | 1717 | 49738 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:02.189066887 CET | 49738 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:02.325666904 CET | 49738 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:02.327860117 CET | 1717 | 49738 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:02.460285902 CET | 1717 | 49738 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:04.097162962 CET | 49740 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:04.227060080 CET | 1717 | 49740 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:04.227158070 CET | 49740 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:04.297550917 CET | 49740 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:04.429264069 CET | 1717 | 49740 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:18.247970104 CET | 49740 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:18.378622055 CET | 1717 | 49740 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:23.544743061 CET | 49740 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:23.676480055 CET | 1717 | 49740 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:26.499550104 CET | 1717 | 49740 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:26.499604940 CET | 49740 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:26.526990891 CET | 1717 | 49740 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:26.527060986 CET | 49740 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:30.716356993 CET | 49740 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:30.718528032 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:30.846462965 CET | 1717 | 49740 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:30.849338055 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:30.849498034 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:30.878418922 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:31.002310991 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:31.002367020 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:31.126754999 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:31.126852036 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:31.251806021 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:32.575937986 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:32.700706005 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:36.294774055 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:36.419780016 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:41.232218981 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:41.352688074 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:41.352749109 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:41.473118067 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:41.473184109 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:41.594810963 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:51.482342958 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:51.692791939 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:51.692846060 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:51.817802906 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:52.832015038 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:52.834178925 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:56.639334917 CET | 49802 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:56.640933037 CET | 49858 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:56.759891987 CET | 1717 | 49802 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:56.761704922 CET | 1717 | 49858 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:56.761801004 CET | 49858 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:56.783386946 CET | 49858 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:56.905982018 CET | 1717 | 49858 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:37:59.826061964 CET | 49858 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:37:59.947568893 CET | 1717 | 49858 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:07.170624018 CET | 49858 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:07.317455053 CET | 1717 | 49858 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:12.279177904 CET | 49858 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:12.403177023 CET | 1717 | 49858 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:12.403238058 CET | 49858 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:12.527143002 CET | 1717 | 49858 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:12.527223110 CET | 49858 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:12.650832891 CET | 1717 | 49858 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:12.650903940 CET | 49858 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:12.780735970 CET | 1717 | 49858 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:18.707847118 CET | 1717 | 49858 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:18.708015919 CET | 49858 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:22.654056072 CET | 49858 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:22.656582117 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:22.776670933 CET | 1717 | 49858 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:22.783451080 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:22.783519030 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:22.811214924 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:22.935795069 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:23.060559034 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:23.181123018 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:23.181206942 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:23.301259995 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:28.171348095 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:28.327498913 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:28.327585936 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:28.447844982 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:28.447907925 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:28.569936991 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:31.372901917 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:31.500042915 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:38.591758966 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:38.711950064 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:38.712008953 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:38.832278013 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:38.832381964 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:38.955873013 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:39.732244015 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:39.852535963 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:44.683634043 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:44.683757067 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:49.091639996 CET | 49913 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:49.093862057 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:49.211589098 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:49.213849068 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:49.213922024 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:49.236452103 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:49.356601000 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:49.359453917 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:49.479415894 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:53.029309034 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:53.150149107 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:54.388602972 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:54.508635044 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:54.508691072 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:54.629296064 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:38:54.629354000 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:38:54.749331951 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:03.967722893 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:04.087776899 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:05.404603004 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:05.524914980 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:05.779587984 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:05.900897026 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:05.935728073 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:06.062566042 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:11.045108080 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:11.121413946 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:11.121488094 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:11.121596098 CET | 49969 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:11.123575926 CET | 50010 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:11.165774107 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:11.241677046 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:11.241746902 CET | 1717 | 49969 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:11.243691921 CET | 1717 | 50010 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:11.243777037 CET | 50010 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:11.269329071 CET | 50010 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:11.389291048 CET | 1717 | 50010 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:11.391614914 CET | 50010 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:11.514956951 CET | 1717 | 50010 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:17.201450109 CET | 50010 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:17.321664095 CET | 1717 | 50010 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:23.248316050 CET | 50010 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:23.372224092 CET | 1717 | 50010 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:32.748306990 CET | 50010 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:32.870688915 CET | 1717 | 50010 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:32.870764017 CET | 50010 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:32.990773916 CET | 1717 | 50010 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:33.153541088 CET | 1717 | 50010 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:33.153645992 CET | 50010 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:37.826186895 CET | 50010 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:37.829952002 CET | 50011 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:37.946310997 CET | 1717 | 50010 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:37.949985981 CET | 1717 | 50011 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:37.950254917 CET | 50011 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:37.969410896 CET | 50011 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:38.090658903 CET | 1717 | 50011 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:41.248409033 CET | 50011 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:41.368678093 CET | 1717 | 50011 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:47.779447079 CET | 50011 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:47.899832964 CET | 1717 | 50011 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:48.185710907 CET | 50011 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:48.305721045 CET | 1717 | 50011 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:53.482856989 CET | 50011 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:53.604926109 CET | 1717 | 50011 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:53.953243971 CET | 50011 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:39:54.085891962 CET | 1717 | 50011 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:59.919374943 CET | 1717 | 50011 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:39:59.919681072 CET | 50011 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:03.515822887 CET | 50012 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:03.515822887 CET | 50011 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:03.636075020 CET | 1717 | 50011 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:03.636094093 CET | 1717 | 50012 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:03.636249065 CET | 50012 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:03.655807018 CET | 50012 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:03.775949955 CET | 1717 | 50012 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:08.764025927 CET | 50012 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:08.884207964 CET | 1717 | 50012 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:08.884291887 CET | 50012 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:09.004633904 CET | 1717 | 50012 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:10.233426094 CET | 50012 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:10.353462934 CET | 1717 | 50012 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:14.139497042 CET | 50012 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:14.259413004 CET | 1717 | 50012 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:15.170139074 CET | 50012 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:15.290287018 CET | 1717 | 50012 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:25.585197926 CET | 1717 | 50012 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:25.585268021 CET | 50012 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:32.294898033 CET | 50012 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:32.296061993 CET | 50013 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:32.421237946 CET | 1717 | 50012 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:32.421261072 CET | 1717 | 50013 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:32.421428919 CET | 50013 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:32.443388939 CET | 50013 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:32.563482046 CET | 1717 | 50013 | 89.40.31.232 | 192.168.2.4 |
Nov 25, 2024 15:40:45.736474037 CET | 50013 | 1717 | 192.168.2.4 | 89.40.31.232 |
Nov 25, 2024 15:40:45.856918097 CET | 1717 | 50013 | 89.40.31.232 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 15:36:14.194274902 CET | 54994 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 25, 2024 15:36:14.344681025 CET | 53 | 54994 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 25, 2024 15:36:14.194274902 CET | 192.168.2.4 | 1.1.1.1 | 0x8f45 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 25, 2024 15:36:14.344681025 CET | 1.1.1.1 | 192.168.2.4 | 0x8f45 | No error (0) | 149.154.167.220 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 149.154.167.220 | 443 | 7360 | C:\Users\user\Desktop\tE3ZXBTP0B.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 14:36:16 UTC | 442 | OUT | |
2024-11-25 14:36:17 UTC | 388 | IN | |
2024-11-25 14:36:17 UTC | 440 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 09:36:08 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\Desktop\tE3ZXBTP0B.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xd60000 |
File size: | 76'800 bytes |
MD5 hash: | ACF863DD1A3D9BEA3677B677429E6963 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 21.5% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 6 |
Total number of Limit Nodes: | 0 |
Graph
Function 00007FFD9B8B0E00 Relevance: .6, Instructions: 553COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B8146 Relevance: .5, Instructions: 472COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B8EF2 Relevance: .5, Instructions: 458COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|