Windows
Analysis Report
DJ5PhUwOsM.exe
Overview
General Information
Sample name: | DJ5PhUwOsM.exerenamed because original name is a hash value |
Original sample name: | 65ea7c521264d69a5e044a2fa7aa5a330385e733b1cefbff31cb805abaf067fa.exe |
Analysis ID: | 1562433 |
MD5: | d61526463472da19dd8869f484a8f4ef |
SHA1: | 20514ac586fb6847057be18ecf00b84cda7e948f |
SHA256: | 65ea7c521264d69a5e044a2fa7aa5a330385e733b1cefbff31cb805abaf067fa |
Tags: | 89-40-31-232exeuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- DJ5PhUwOsM.exe (PID: 6224 cmdline:
"C:\Users\ user\Deskt op\DJ5PhUw OsM.exe" MD5: D61526463472DA19DD8869F484A8F4EF) - FB_7BD8.tmp.exe (PID: 6404 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\FB_7BD 8.tmp.exe" MD5: A21DF2C0CCA131EB534F520FD641ADB5) - FB_7D21.tmp.exe (PID: 4444 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\FB_7D2 1.tmp.exe" MD5: 068C99328320CAAA7C5F2D31B0FF214B)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["89.40.31.232"], "Port": 1717, "Aes key": "1717", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk", "Telegram Chatid": "793028759", "Version": "XWorm V5.6"}
{"Exfil Mode": "SMTP", "Port": "587", "Host": "162.254.34.31", "Username": "sendxambro@educt.shop", "Password": "ABwuRZS5Mjh5"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_TelegramRecon | Yara detected Telegram Recon | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_XWorm_1 | Yara detected XWorm | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 20 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
Click to see the 43 entries |
System Summary |
---|
Source: | Author: frack113: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T15:36:14.278202+0100 | 2030171 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 162.254.34.31 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T15:36:25.737135+0100 | 2855542 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 162.254.34.31 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T15:36:25.737135+0100 | 2855245 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 162.254.34.31 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T15:36:14.278202+0100 | 2840032 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 162.254.34.31 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T15:36:25.030421+0100 | 2853685 | 1 | A Network Trojan was detected | 192.168.2.5 | 49706 | 149.154.167.220 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | DNS query: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Window created: | Jump to behavior |
Operating System Destruction |
---|
Source: | Process information set: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process Stats: |
Source: | Code function: | 2_2_00E7E270 | |
Source: | Code function: | 2_2_00E7A958 | |
Source: | Code function: | 2_2_00E74A98 | |
Source: | Code function: | 2_2_00E73E80 | |
Source: | Code function: | 2_2_00E741C8 | |
Source: | Code function: | 2_2_00E7C36F | |
Source: | Code function: | 2_2_064F5640 | |
Source: | Code function: | 2_2_064F6668 | |
Source: | Code function: | 2_2_064F7DF0 | |
Source: | Code function: | 2_2_064FC200 | |
Source: | Code function: | 2_2_064FB2A2 | |
Source: | Code function: | 2_2_064F3100 | |
Source: | Code function: | 2_2_064F7710 | |
Source: | Code function: | 2_2_064F2409 | |
Source: | Code function: | 2_2_064FE418 | |
Source: | Code function: | 2_2_064F5D5F | |
Source: | Code function: | 2_2_064F0040 | |
Source: | Code function: | 2_2_064F0006 | |
Source: | Code function: | 3_2_00007FF848F28EF2 | |
Source: | Code function: | 3_2_00007FF848F28146 | |
Source: | Code function: | 3_2_00007FF848F2651D |
Source: | Dropped File: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Binary string: |
Source: | Classification label: |
Source: | Code function: | 0_2_00401000 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | 2_2_00E7E7EB | |
Source: | Code function: | 2_2_00E76A23 | |
Source: | Code function: | 2_2_00E70C7A | |
Source: | Code function: | 3_2_00007FF848F2A3CA | |
Source: | Code function: | 3_2_00007FF848F200C1 |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Language, Device and Operating System Detection |
---|
Source: | File source: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 231 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 2 OS Credential Dumping | 1 File and Directory Discovery | Remote Services | 11 Archive Collected Data | 1 Web Service | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 11 Process Injection | 1 Deobfuscate/Decode Files or Information | 1 Input Capture | 25 System Information Discovery | Remote Desktop Protocol | 2 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Obfuscated Files or Information | 1 Credentials in Registry | 1 Query Registry | SMB/Windows Admin Shares | 1 Email Collection | 11 Encrypted Channel | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Software Packing | NTDS | 331 Security Software Discovery | Distributed Component Object Model | 1 Input Capture | 1 Non-Standard Port | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 Process Discovery | SSH | 1 Clipboard Data | 2 Non-Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 241 Virtualization/Sandbox Evasion | Cached Domain Credentials | 241 Virtualization/Sandbox Evasion | VNC | GUI Input Capture | 123 Application Layer Protocol | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 11 Process Injection | DCSync | 1 Application Window Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | 1 System Network Configuration Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
92% | ReversingLabs | Win32.Backdoor.Fynloski | ||
100% | Avira | TR/Spy.Gen8 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/Spy.Gen | ||
100% | Avira | TR/Spy.Gen8 | ||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
88% | ReversingLabs | ByteCode-MSIL.Trojan.AgentTesla | ||
82% | ReversingLabs | ByteCode-MSIL.Spyware.AsyncRAT |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.ipify.org | 104.26.13.205 | true | false | high | |
api.telegram.org | 149.154.167.220 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
149.154.167.220 | api.telegram.org | United Kingdom | 62041 | TELEGRAMRU | false | |
89.40.31.232 | unknown | Romania | 35512 | TELEMEDIA-ASRO | true | |
104.26.13.205 | api.ipify.org | United States | 13335 | CLOUDFLARENETUS | false | |
162.254.34.31 | unknown | United States | 64200 | VIVIDHOSTINGUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1562433 |
Start date and time: | 2024-11-25 15:35:24 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 8m 49s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | DJ5PhUwOsM.exerenamed because original name is a hash value |
Original Sample Name: | 65ea7c521264d69a5e044a2fa7aa5a330385e733b1cefbff31cb805abaf067fa.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/2@2/4 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: DJ5PhUwOsM.exe
Time | Type | Description |
---|---|---|
09:36:20 | API Interceptor | |
09:36:35 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
149.154.167.220 | Get hash | malicious | XWorm | Browse | ||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | AsyncRAT | Browse | |||
Get hash | malicious | DarkCloud | Browse | |||
Get hash | malicious | GuLoader, MassLogger RAT | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | DarkCloud | Browse | |||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse | |||
89.40.31.232 | Get hash | malicious | Azorult, GuLoader | Browse |
| |
Get hash | malicious | Azorult, GuLoader | Browse |
| ||
104.26.13.205 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader, Stealc, Vidar | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
| ||
Get hash | malicious | Node Stealer | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, RDPWrap Tool, LummaC Stealer, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, RDPWrap Tool, LummaC Stealer, Stealc, Vidar | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
api.ipify.org | Get hash | malicious | AgentTesla, XWorm | Browse |
| |
Get hash | malicious | AgentTesla, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Gabagool | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
api.telegram.org | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | NetSupport RAT | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
VIVIDHOSTINGUS | Get hash | malicious | AgentTesla, XWorm | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
TELEMEDIA-ASRO | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Azorult, GuLoader | Browse |
| ||
Get hash | malicious | Azorult, GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Users\user\Desktop\DJ5PhUwOsM.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 240128 |
Entropy (8bit): | 4.998082516808912 |
Encrypted: | false |
SSDEEP: | 3072:Z+2Lmlx1JlKiSBTxbBGiz64tlyz5X0JdYA4:Z+2Lmlx1JldSVxbBF643yOdx |
MD5: | A21DF2C0CCA131EB534F520FD641ADB5 |
SHA1: | CD39E12E326191888B836C3419AC2CB71C2B5B11 |
SHA-256: | FB247F5397BA1B2D9328D1ACC2FD322181A91CED1953853ABB41718DC21198AE |
SHA-512: | DEE53E8D4EEF995340308A7EF184217556DE7C0BA1F1B3FFE0937FE6EA0FBCFD5C3B09BDF8A937A6849B9A2401CB89A8A1C720668A6041E0738FCFA7DFE6AF02 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\DJ5PhUwOsM.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 76800 |
Entropy (8bit): | 6.066050319145751 |
Encrypted: | false |
SSDEEP: | 1536:mj2knMmhKdS08aK+rgYkdQOV9bFejQ4HyLPnqo9OMwPvyia:mQTnDrGdQo9bFxYo9OtVa |
MD5: | 068C99328320CAAA7C5F2D31B0FF214B |
SHA1: | E18B1E08E7F256602BE60E1D75B15C2C73284CA2 |
SHA-256: | E9434C0BF7BE5E39CFAD4FE44BB996B09C1283DE5706A8721A33363080E9D016 |
SHA-512: | A86C80A454C912F379C8077A1FCFFC5B79681E4DE7020FDA900E55A59566DFC5E11086695448CDD33659ED6E6E000A4A46009BE29FFA5A9EB3730014DE48AA18 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.231286300665583 |
TrID: |
|
File name: | DJ5PhUwOsM.exe |
File size: | 335'872 bytes |
MD5: | d61526463472da19dd8869f484a8f4ef |
SHA1: | 20514ac586fb6847057be18ecf00b84cda7e948f |
SHA256: | 65ea7c521264d69a5e044a2fa7aa5a330385e733b1cefbff31cb805abaf067fa |
SHA512: | 925089713ea4877de9300c0998eabcef4850af08ea6e7a12704e92736928461e54a8fa8cb56c3c910ca334e5395a5497f38715237970f4f70532a26405cd3fee |
SSDEEP: | 3072:7+2Lmlx1JlKiSBTxbBGiz64tlyz5X0JdYA4TQTnDrGdQo9bFxYo9OtVa2M:7+2Lmlx1JldSVxbBF643yOdxBDrGVbHR |
TLSH: | 7C6472027F88EB11E1A93E3782EF2D2413B2B0C71633D20F6F499B6514516869D7EB6D |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5.<.qhR.qhR.qhR..wX.zhR..t\.phR..wV.shR..g..thR.qhS.nhR..wY.shR..nT.phR.RichqhR.........................PE..L...)..P........... |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x401190 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x50CC1329 [Sat Dec 15 06:05:29 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 009023b6b22e202aa54365d2270f6f95 |
Instruction |
---|
push ebp |
mov ebp, esp |
push FFFFFFFFh |
push 00402080h |
push 00401310h |
mov eax, dword ptr fs:[00000000h] |
push eax |
mov dword ptr fs:[00000000h], esp |
sub esp, 68h |
push ebx |
push esi |
push edi |
mov dword ptr [ebp-18h], esp |
xor ebx, ebx |
mov dword ptr [ebp-04h], ebx |
push 00000002h |
call dword ptr [00402064h] |
pop ecx |
or dword ptr [00403040h], FFFFFFFFh |
or dword ptr [00403044h], FFFFFFFFh |
call dword ptr [00402060h] |
mov ecx, dword ptr [0040303Ch] |
mov dword ptr [eax], ecx |
call dword ptr [0040205Ch] |
mov ecx, dword ptr [00403038h] |
mov dword ptr [eax], ecx |
mov eax, dword ptr [00402058h] |
mov eax, dword ptr [eax] |
mov dword ptr [00403048h], eax |
call 00007FB600F1BD15h |
cmp dword ptr [00403028h], ebx |
jne 00007FB600F1BC0Eh |
push 0040130Ch |
call dword ptr [00402054h] |
pop ecx |
call 00007FB600F1BCE7h |
push 0040300Ch |
push 00403008h |
call 00007FB600F1BCD2h |
mov eax, dword ptr [00403034h] |
mov dword ptr [ebp-6Ch], eax |
lea eax, dword ptr [ebp-6Ch] |
push eax |
push dword ptr [00403030h] |
lea eax, dword ptr [ebp-64h] |
push eax |
lea eax, dword ptr [ebp-70h] |
push eax |
lea eax, dword ptr [ebp-60h] |
push eax |
call dword ptr [0040204Ch] |
push 00403004h |
push 00403000h |
call 00007FB600F1BC9Fh |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x208c | 0x50 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x4000 | 0x4da08 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x80 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x31c | 0x1000 | 4379eb4853c8b1bb4513db50d6997472 | False | 0.1533203125 | data | 1.6095484668607238 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x2000 | 0x336 | 0x1000 | 2f1aabb6617ff8136ed129a4721a87c8 | False | 0.117919921875 | data | 1.3419768456025012 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x3000 | 0x4c | 0x1000 | 9a1067c760bc211bd6646c8feedced16 | False | 0.013671875 | data | 0.0503620825472891 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x4000 | 0x4da08 | 0x4e000 | 6d0726a2060588cb9ecd9049b606796b | False | 0.41466033153044873 | data | 5.38872769405723 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_RCDATA | 0x40d0 | 0x3aa05 | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows | 0.35672731361370574 | ||
RT_RCDATA | 0x3ead8 | 0x12c05 | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows | 0.606536032810364 | ||
RT_VERSION | 0x516e0 | 0x328 | data | Chinese | China | 0.4443069306930693 |
DLL | Import |
---|---|
KERNEL32.dll | ExitProcess, FreeResource, CloseHandle, WriteFile, CreateFileA, MoveFileExA, GetTempFileNameA, GetTempPathA, LockResource, LoadResource, SizeofResource, FindResourceA, GetModuleHandleA, GetStartupInfoA |
SHELL32.dll | ShellExecuteA |
MSVCRT.dll | sprintf, _exit, exit, _acmdln, __getmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _except_handler3, _controlfp, _XcptFilter |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Chinese | China |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T15:36:14.278202+0100 | 2030171 | ET MALWARE AgentTesla Exfil Via SMTP | 1 | 192.168.2.5 | 49705 | 162.254.34.31 | 587 | TCP |
2024-11-25T15:36:14.278202+0100 | 2840032 | ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 | 1 | 192.168.2.5 | 49705 | 162.254.34.31 | 587 | TCP |
2024-11-25T15:36:25.030421+0100 | 2853685 | ETPRO MALWARE Win32/XWorm Checkin via Telegram | 1 | 192.168.2.5 | 49706 | 149.154.167.220 | 443 | TCP |
2024-11-25T15:36:25.737135+0100 | 2855245 | ETPRO MALWARE Agent Tesla Exfil via SMTP | 1 | 192.168.2.5 | 49705 | 162.254.34.31 | 587 | TCP |
2024-11-25T15:36:25.737135+0100 | 2855542 | ETPRO MALWARE Agent Tesla CnC Exfil Activity | 1 | 192.168.2.5 | 49705 | 162.254.34.31 | 587 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 15:36:19.151210070 CET | 49704 | 443 | 192.168.2.5 | 104.26.13.205 |
Nov 25, 2024 15:36:19.151271105 CET | 443 | 49704 | 104.26.13.205 | 192.168.2.5 |
Nov 25, 2024 15:36:19.151432037 CET | 49704 | 443 | 192.168.2.5 | 104.26.13.205 |
Nov 25, 2024 15:36:19.158540010 CET | 49704 | 443 | 192.168.2.5 | 104.26.13.205 |
Nov 25, 2024 15:36:19.158576965 CET | 443 | 49704 | 104.26.13.205 | 192.168.2.5 |
Nov 25, 2024 15:36:20.489238024 CET | 443 | 49704 | 104.26.13.205 | 192.168.2.5 |
Nov 25, 2024 15:36:20.493083000 CET | 49704 | 443 | 192.168.2.5 | 104.26.13.205 |
Nov 25, 2024 15:36:20.545299053 CET | 49704 | 443 | 192.168.2.5 | 104.26.13.205 |
Nov 25, 2024 15:36:20.545312881 CET | 443 | 49704 | 104.26.13.205 | 192.168.2.5 |
Nov 25, 2024 15:36:20.545635939 CET | 443 | 49704 | 104.26.13.205 | 192.168.2.5 |
Nov 25, 2024 15:36:20.590617895 CET | 49704 | 443 | 192.168.2.5 | 104.26.13.205 |
Nov 25, 2024 15:36:20.758320093 CET | 49704 | 443 | 192.168.2.5 | 104.26.13.205 |
Nov 25, 2024 15:36:20.803339958 CET | 443 | 49704 | 104.26.13.205 | 192.168.2.5 |
Nov 25, 2024 15:36:21.120558977 CET | 443 | 49704 | 104.26.13.205 | 192.168.2.5 |
Nov 25, 2024 15:36:21.120635986 CET | 443 | 49704 | 104.26.13.205 | 192.168.2.5 |
Nov 25, 2024 15:36:21.120723009 CET | 49704 | 443 | 192.168.2.5 | 104.26.13.205 |
Nov 25, 2024 15:36:21.131345987 CET | 49704 | 443 | 192.168.2.5 | 104.26.13.205 |
Nov 25, 2024 15:36:21.749145985 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:22.034368038 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:22.036299944 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:22.827523947 CET | 49706 | 443 | 192.168.2.5 | 149.154.167.220 |
Nov 25, 2024 15:36:22.827562094 CET | 443 | 49706 | 149.154.167.220 | 192.168.2.5 |
Nov 25, 2024 15:36:22.827639103 CET | 49706 | 443 | 192.168.2.5 | 149.154.167.220 |
Nov 25, 2024 15:36:22.844223976 CET | 49706 | 443 | 192.168.2.5 | 149.154.167.220 |
Nov 25, 2024 15:36:22.844257116 CET | 443 | 49706 | 149.154.167.220 | 192.168.2.5 |
Nov 25, 2024 15:36:23.238554955 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:23.273309946 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:23.435730934 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:23.694010019 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:23.694900036 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:23.875370026 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:24.136125088 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:24.137239933 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:24.279877901 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:24.444256067 CET | 443 | 49706 | 149.154.167.220 | 192.168.2.5 |
Nov 25, 2024 15:36:24.444350004 CET | 49706 | 443 | 192.168.2.5 | 149.154.167.220 |
Nov 25, 2024 15:36:24.449929953 CET | 49706 | 443 | 192.168.2.5 | 149.154.167.220 |
Nov 25, 2024 15:36:24.449937105 CET | 443 | 49706 | 149.154.167.220 | 192.168.2.5 |
Nov 25, 2024 15:36:24.450269938 CET | 443 | 49706 | 149.154.167.220 | 192.168.2.5 |
Nov 25, 2024 15:36:24.496922016 CET | 49706 | 443 | 192.168.2.5 | 149.154.167.220 |
Nov 25, 2024 15:36:24.511181116 CET | 49706 | 443 | 192.168.2.5 | 149.154.167.220 |
Nov 25, 2024 15:36:24.550875902 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:24.551141977 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:24.551332951 CET | 443 | 49706 | 149.154.167.220 | 192.168.2.5 |
Nov 25, 2024 15:36:24.683243036 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:24.947067022 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:24.947577953 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:25.030436039 CET | 443 | 49706 | 149.154.167.220 | 192.168.2.5 |
Nov 25, 2024 15:36:25.030504942 CET | 443 | 49706 | 149.154.167.220 | 192.168.2.5 |
Nov 25, 2024 15:36:25.030584097 CET | 49706 | 443 | 192.168.2.5 | 149.154.167.220 |
Nov 25, 2024 15:36:25.043129921 CET | 49706 | 443 | 192.168.2.5 | 149.154.167.220 |
Nov 25, 2024 15:36:25.079375982 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:25.342144012 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:25.342322111 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:25.475276947 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:25.736237049 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:25.737077951 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:25.737134933 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:25.737174034 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:25.737209082 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:25.885725975 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:25.885746956 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:25.885756016 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:25.885771036 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:26.256926060 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:36:26.309386015 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:36:29.351111889 CET | 49707 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:36:29.507122040 CET | 1717 | 49707 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:36:29.507253885 CET | 49707 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:36:29.598382950 CET | 49707 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:36:29.750399113 CET | 1717 | 49707 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:36:40.269285917 CET | 49707 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:36:40.398169994 CET | 1717 | 49707 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:36:50.904160023 CET | 49707 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:36:51.066288948 CET | 1717 | 49707 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:36:51.493657112 CET | 1717 | 49707 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:36:51.493819952 CET | 49707 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:36:53.887659073 CET | 49707 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:36:53.889051914 CET | 49753 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:36:54.015647888 CET | 1717 | 49707 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:36:54.018667936 CET | 1717 | 49753 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:36:54.018773079 CET | 49753 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:36:54.036510944 CET | 49753 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:36:54.170738935 CET | 1717 | 49753 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:04.153536081 CET | 49753 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:04.289515972 CET | 1717 | 49753 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:14.282002926 CET | 49753 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:14.409111977 CET | 1717 | 49753 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:15.947592020 CET | 1717 | 49753 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:15.947707891 CET | 49753 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:17.981745958 CET | 49753 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:17.983418941 CET | 49806 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:18.109812021 CET | 1717 | 49753 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:18.120250940 CET | 1717 | 49806 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:18.122641087 CET | 49806 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:18.144352913 CET | 49806 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:18.272723913 CET | 1717 | 49806 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:30.356631994 CET | 49806 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:30.482741117 CET | 1717 | 49806 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:31.575370073 CET | 49806 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:31.700321913 CET | 1717 | 49806 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:36.466365099 CET | 49806 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:36.586472034 CET | 1717 | 49806 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:36.586534977 CET | 49806 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:36.706866026 CET | 1717 | 49806 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:37.434652090 CET | 49806 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:37.554749012 CET | 1717 | 49806 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:40.082515955 CET | 1717 | 49806 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:40.082655907 CET | 49806 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:41.591299057 CET | 49806 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:41.592200041 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:41.716840982 CET | 1717 | 49806 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:41.716857910 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:41.716970921 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:41.738238096 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:41.860450029 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:46.169111013 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:46.289196014 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:46.825613976 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:46.948570013 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:46.948633909 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:47.068926096 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:47.068989992 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:47.189153910 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:51.263117075 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:51.389348984 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:55.219010115 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:55.469080925 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:57.484554052 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:57.604497910 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:58.278601885 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:58.399355888 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:58.399403095 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:58.519670963 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:37:58.700515032 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:37:58.913577080 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:01.781259060 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:38:01.922498941 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:38:02.163774014 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:38:02.163791895 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:38:02.163867950 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:38:02.163976908 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 |
Nov 25, 2024 15:38:02.284667969 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 |
Nov 25, 2024 15:38:03.652617931 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:03.652687073 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:08.481930017 CET | 49856 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:08.484034061 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:08.602613926 CET | 1717 | 49856 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:08.604975939 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:08.605068922 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:08.634867907 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:08.758608103 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:08.758671045 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:08.885420084 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:08.885499954 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:09.009804010 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:09.009884119 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:09.129853964 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:10.731682062 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:10.851682901 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:14.216036081 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:14.335956097 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:19.326797962 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:19.450186968 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:19.469283104 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:19.590806007 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:28.419130087 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:28.539211988 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:30.231813908 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:30.352139950 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:30.352214098 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:30.474231005 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:30.513076067 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:30.513145924 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:30.514244080 CET | 49913 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:30.515546083 CET | 49961 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:30.634522915 CET | 1717 | 49913 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:30.662224054 CET | 1717 | 49961 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:30.662312031 CET | 49961 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:30.687355995 CET | 49961 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:30.808187962 CET | 1717 | 49961 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:30.841073990 CET | 49961 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:30.961476088 CET | 1717 | 49961 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:30.961545944 CET | 49961 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:31.083446980 CET | 1717 | 49961 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:40.435451984 CET | 49961 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:40.555836916 CET | 1717 | 49961 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:41.669017076 CET | 49961 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:41.789226055 CET | 1717 | 49961 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:46.919327974 CET | 49961 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:47.039938927 CET | 1717 | 49961 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:47.091120958 CET | 49961 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:47.211934090 CET | 1717 | 49961 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:52.646394014 CET | 1717 | 49961 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:52.646470070 CET | 49961 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:57.231628895 CET | 49961 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:57.234869957 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:57.353754997 CET | 1717 | 49961 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:57.355071068 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:38:57.355417967 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:57.372751951 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:38:57.492952108 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:01.028656006 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:01.154001951 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:01.843379021 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:02.140701056 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:02.544101000 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:02.667670012 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:02.667737007 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:02.788516998 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:02.788563013 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:02.911818027 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:05.044255972 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:05.188520908 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:06.355285883 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:06.475358009 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:11.013063908 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:11.154827118 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:12.700413942 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:12.820470095 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:12.981554031 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:13.102833986 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:19.302583933 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:19.302648067 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:23.262799978 CET | 49985 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:23.265784025 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:23.387221098 CET | 1717 | 49985 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:23.390176058 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:23.393450975 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:23.410497904 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:23.537347078 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:25.575287104 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:25.751666069 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:38.309710979 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:38.429846048 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:39.309736013 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:39.430098057 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:39.431746006 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:39.551879883 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:39.795427084 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:39.920881033 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:42.575504065 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:42.697204113 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:44.638061047 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:44.758213997 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:44.758265972 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:44.878259897 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:44.888190031 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:45.008212090 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:45.008285999 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:45.128770113 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:45.128818989 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:45.249113083 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:45.249172926 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:45.365629911 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:45.365699053 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:45.365775108 CET | 49986 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:45.367821932 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:45.371934891 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:45.492324114 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:45.492346048 CET | 1717 | 49986 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:45.494498968 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:45.494637966 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:45.525410891 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:45.647073984 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:46.653628111 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:46.817116022 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:46.817372084 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:47.046274900 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:47.046350002 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:47.169305086 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:56.295425892 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:56.415806055 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:39:58.497627974 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:39:58.617973089 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:03.638676882 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:03.758744001 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:03.758836985 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:03.879014969 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:03.983506918 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:04.107280016 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:04.173465967 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:04.293706894 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:07.413423061 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:07.413497925 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:08.965887070 CET | 49987 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:08.968673944 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:09.086004019 CET | 1717 | 49987 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:09.114708900 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:09.114798069 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:09.136785984 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:09.258560896 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:09.997370958 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:10.117438078 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:11.669154882 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:11.789186954 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:12.387965918 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:12.509907007 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:13.075401068 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:13.196583033 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:13.840946913 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:13.967153072 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:19.388103008 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:19.511447906 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:21.810177088 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:22.068439007 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:24.544785023 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:24.664972067 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:31.054116964 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:31.054227114 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:36.044013023 CET | 49988 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:36.044823885 CET | 49989 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:36.165395021 CET | 1717 | 49988 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:36.166178942 CET | 1717 | 49989 | 89.40.31.232 | 192.168.2.5 |
Nov 25, 2024 15:40:36.166282892 CET | 49989 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:36.181252956 CET | 49989 | 1717 | 192.168.2.5 | 89.40.31.232 |
Nov 25, 2024 15:40:36.302171946 CET | 1717 | 49989 | 89.40.31.232 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 15:36:18.994394064 CET | 59824 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 25, 2024 15:36:19.145001888 CET | 53 | 59824 | 1.1.1.1 | 192.168.2.5 |
Nov 25, 2024 15:36:22.549665928 CET | 55768 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 25, 2024 15:36:22.702313900 CET | 53 | 55768 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 25, 2024 15:36:18.994394064 CET | 192.168.2.5 | 1.1.1.1 | 0xc92e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 25, 2024 15:36:22.549665928 CET | 192.168.2.5 | 1.1.1.1 | 0xa7d6 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 25, 2024 15:36:19.145001888 CET | 1.1.1.1 | 192.168.2.5 | 0xc92e | No error (0) | 104.26.13.205 | A (IP address) | IN (0x0001) | false | ||
Nov 25, 2024 15:36:19.145001888 CET | 1.1.1.1 | 192.168.2.5 | 0xc92e | No error (0) | 172.67.74.152 | A (IP address) | IN (0x0001) | false | ||
Nov 25, 2024 15:36:19.145001888 CET | 1.1.1.1 | 192.168.2.5 | 0xc92e | No error (0) | 104.26.12.205 | A (IP address) | IN (0x0001) | false | ||
Nov 25, 2024 15:36:22.702313900 CET | 1.1.1.1 | 192.168.2.5 | 0xa7d6 | No error (0) | 149.154.167.220 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 104.26.13.205 | 443 | 6404 | C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 14:36:20 UTC | 155 | OUT | |
2024-11-25 14:36:21 UTC | 399 | IN | |
2024-11-25 14:36:21 UTC | 11 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49706 | 149.154.167.220 | 443 | 4444 | C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 14:36:24 UTC | 446 | OUT | |
2024-11-25 14:36:25 UTC | 388 | IN | |
2024-11-25 14:36:25 UTC | 444 | IN |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Nov 25, 2024 15:36:23.238554955 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 | 220 server1.educt.shop127.0.0.1 ESMTP Postfix |
Nov 25, 2024 15:36:23.273309946 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 | EHLO 910646 |
Nov 25, 2024 15:36:23.694010019 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 | 250-server1.educt.shop127.0.0.1 250-PIPELINING 250-SIZE 204800000 250-ETRN 250-STARTTLS 250-AUTH PLAIN LOGIN 250-AUTH=PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING |
Nov 25, 2024 15:36:23.694900036 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 | AUTH login c2VuZHhhbWJyb0BlZHVjdC5zaG9w |
Nov 25, 2024 15:36:24.136125088 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 | 334 UGFzc3dvcmQ6 |
Nov 25, 2024 15:36:24.550875902 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 | 235 2.7.0 Authentication successful |
Nov 25, 2024 15:36:24.551141977 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 | MAIL FROM:<sendxambro@educt.shop> |
Nov 25, 2024 15:36:24.947067022 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 | 250 2.1.0 Ok |
Nov 25, 2024 15:36:24.947577953 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 | RCPT TO:<ambro@educt.shop> |
Nov 25, 2024 15:36:25.342144012 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 | 250 2.1.5 Ok |
Nov 25, 2024 15:36:25.342322111 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 | DATA |
Nov 25, 2024 15:36:25.736237049 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 | 354 End data with <CR><LF>.<CR><LF> |
Nov 25, 2024 15:36:25.737209082 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 | . |
Nov 25, 2024 15:36:26.256926060 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 | 250 2.0.0 Ok: queued as 25D1F76966 |
Nov 25, 2024 15:38:01.781259060 CET | 49705 | 587 | 192.168.2.5 | 162.254.34.31 | QUIT |
Nov 25, 2024 15:38:02.163774014 CET | 587 | 49705 | 162.254.34.31 | 192.168.2.5 | 221 2.0.0 Bye |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 09:36:16 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\Desktop\DJ5PhUwOsM.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 335'872 bytes |
MD5 hash: | D61526463472DA19DD8869F484A8F4EF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 09:36:17 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4d0000 |
File size: | 240'128 bytes |
MD5 hash: | A21DF2C0CCA131EB534F520FD641ADB5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 09:36:17 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xfa0000 |
File size: | 76'800 bytes |
MD5 hash: | 068C99328320CAAA7C5F2D31B0FF214B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 86.7% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 47.1% |
Total number of Nodes: | 17 |
Total number of Limit Nodes: | 1 |
Graph
Callgraph
Function 00401000 Relevance: 22.6, APIs: 15, Instructions: 119fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00401190 Relevance: 16.6, APIs: 11, Instructions: 111COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Execution Graph
Execution Coverage: | 11.7% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 22 |
Total number of Limit Nodes: | 6 |
Graph
Function 064F3100 Relevance: 8.0, Strings: 6, Instructions: 545COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E73E80 Relevance: 4.0, Strings: 3, Instructions: 238COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F7DF0 Relevance: 3.0, Strings: 2, Instructions: 490COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E7A958 Relevance: 2.8, Instructions: 2845COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E7E270 Relevance: 2.8, Strings: 2, Instructions: 340COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E74A98 Relevance: 2.8, Strings: 2, Instructions: 266COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E7C36F Relevance: 2.3, Instructions: 2322COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F2409 Relevance: 1.0, Instructions: 1018COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F6668 Relevance: .8, Instructions: 826COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FC200 Relevance: .7, Instructions: 657COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F5640 Relevance: .6, Instructions: 597COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FB2A2 Relevance: .6, Instructions: 570COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FAD48 Relevance: 10.4, Strings: 8, Instructions: 400COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FB6C8 Relevance: 8.0, Strings: 6, Instructions: 473COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F91C0 Relevance: 5.2, Strings: 4, Instructions: 231COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FCFB8 Relevance: 4.6, Strings: 3, Instructions: 807COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F4C10 Relevance: 3.9, Strings: 3, Instructions: 186COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F91B3 Relevance: 2.7, Strings: 2, Instructions: 170COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F4C00 Relevance: 2.6, Strings: 2, Instructions: 140COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FDB2D Relevance: 1.4, Strings: 1, Instructions: 127COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F2290 Relevance: 1.4, Strings: 1, Instructions: 105COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F3918 Relevance: 1.3, Strings: 1, Instructions: 57COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F3920 Relevance: 1.3, Strings: 1, Instructions: 52COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F8340 Relevance: 1.3, Strings: 1, Instructions: 40COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F4341 Relevance: .2, Instructions: 232COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F6268 Relevance: .2, Instructions: 229COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F4660 Relevance: .2, Instructions: 223COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F4678 Relevance: .2, Instructions: 210COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FEB8A Relevance: .2, Instructions: 206COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FEB98 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FFCF7 Relevance: .2, Instructions: 175COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FFAB8 Relevance: .2, Instructions: 163COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FFAB7 Relevance: .2, Instructions: 163COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F54B8 Relevance: .1, Instructions: 135COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F2140 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F2150 Relevance: .1, Instructions: 91COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F3B41 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F3B50 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BDD005 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BDD030 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FEE08 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F42A2 Relevance: .1, Instructions: 60COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F3C60 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FA377 Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F3C4F Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F42B0 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FEE18 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FA388 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F64E8 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F7710 Relevance: 13.0, Strings: 10, Instructions: 468COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FE418 Relevance: 4.3, Strings: 3, Instructions: 577COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E741C8 Relevance: 4.0, Strings: 3, Instructions: 281COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F5D5F Relevance: 2.9, Strings: 2, Instructions: 431COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F0040 Relevance: 2.0, Instructions: 1983COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FA9B0 Relevance: 10.2, Strings: 8, Instructions: 229COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F7110 Relevance: 9.2, Strings: 7, Instructions: 405COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F8448 Relevance: 5.3, Strings: 4, Instructions: 282COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064F8860 Relevance: 5.2, Strings: 4, Instructions: 168COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064FAD38 Relevance: 5.2, Strings: 4, Instructions: 168COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 19.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 42 |
Total number of Limit Nodes: | 4 |
Graph
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|