Resubmissions

20/04/2025, 00:10 UTC

250420-agcc8axyax 10

16/04/2025, 11:04 UTC

250416-m58gsaz1ay 10

15/04/2025, 17:34 UTC

250415-v5ylksypw9 10

15/04/2025, 06:16 UTC

250415-g1p7ras1dw 10

14/04/2025, 08:06 UTC

250414-jzpwpstxhx 10

14/04/2025, 07:59 UTC

250414-jvg1assky4 10

14/04/2025, 07:22 UTC

250414-h7g1dss1h1 10

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/11/2024, 15:15 UTC

General

  • Target

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

  • Size

    669KB

  • MD5

    ead18f3a909685922d7213714ea9a183

  • SHA1

    1270bd7fd62acc00447b30f066bb23f4745869bf

  • SHA256

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

  • SHA512

    6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

  • SSDEEP

    6144:bLUHLyHlwFjxDi2nEZkQ4NXxp0XMgkBWPqdN/jGdfYY7SRA7j4YlvfYAAjJ:4uFi02nEZh4jp0XLuxGdgTm73vL

Malware Config

Extracted

Path

C:\Users\Public\Documents\_readme.txt

Ransom Note
ATTENTION! Don't worry my friend, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-T9WE5uiVT6 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: blower@india.com Reserve e-mail address to contact us: blower@firemail.cc Your personal ID: 046Sdsd3273yifhsisySD60h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
Emails

blower@india.com

blower@firemail.cc

URLs

https://we.tl/t-T9WE5uiVT6

Signatures

  • Renames multiple (63) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
    "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\89c32495-4bb8-4ba4-b962-a87e3de91648" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      • System Location Discovery: System Language Discovery
      PID:3720
    • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Drops desktop.ini file(s)
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsNotTask
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3688
        • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 3688 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4188
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 1196
            5⤵
            • Program crash
            PID:2392
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 1696
          4⤵
          • Program crash
          PID:540
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 2132 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 1204
      2⤵
      • Program crash
      PID:4040
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1852 -ip 1852
    1⤵
      PID:1472
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4188 -ip 4188
      1⤵
        PID:1888
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3688 -ip 3688
        1⤵
          PID:4592

        Network

        • flag-us
          DNS
          8.8.8.8.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          8.8.8.8.in-addr.arpa
          IN PTR
          Response
          8.8.8.8.in-addr.arpa
          IN PTR
          dnsgoogle
        • flag-us
          DNS
          13.86.106.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          13.86.106.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          172.210.232.199.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          172.210.232.199.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          73.159.190.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          73.159.190.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          95.221.229.192.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          95.221.229.192.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          api.2ip.ua
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          api.2ip.ua
          IN A
          Response
          api.2ip.ua
          IN A
          172.67.139.220
          api.2ip.ua
          IN A
          104.21.65.24
        • flag-us
          GET
          https://api.2ip.ua/geo.json
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          172.67.139.220:443
          Request
          GET /geo.json HTTP/1.1
          User-Agent: Microsoft Internet Explorer
          Host: api.2ip.ua
          Response
          HTTP/1.1 200 OK
          Date: Sat, 30 Nov 2024 15:16:50 GMT
          Content-Type: application/json
          Transfer-Encoding: chunked
          Connection: keep-alive
          strict-transport-security: max-age=63072000; preload
          x-frame-options: SAMEORIGIN
          x-content-type-options: nosniff
          x-xss-protection: 1; mode=block; report=...
          access-control-allow-origin: *
          access-control-allow-methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
          access-control-allow-headers: X-Accept-Charset,X-Accept,Content-Type
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ybpBwv4Jo4OoMVPSdZUej22RvuqwW9Qte%2F6qxLl9LmOp4%2BfG8ODenW4%2BcGisTNSSv4f%2FeyZhtyv2EZPs6pqh2JFSY8ZQyqzFaMH%2BrRWqNZXzSIFNI%2Ffw0BdPbDmV"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 8eabcd05988b6fb8-CDG
          alt-svc: h3=":443"; ma=86400
          server-timing: cfL4;desc="?proto=TCP&rtt=37359&min_rtt=33557&rtt_var=11257&sent=6&recv=9&lost=0&retrans=0&sent_bytes=3265&recv_bytes=384&delivery_rate=87162&cwnd=254&unsent_bytes=0&cid=86bb605eb2dae7b2&ts=401&x=0"
        • flag-us
          DNS
          c.pki.goog
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          c.pki.goog
          IN A
          Response
          c.pki.goog
          IN CNAME
          pki-goog.l.google.com
          pki-goog.l.google.com
          IN A
          142.250.200.3
        • flag-gb
          GET
          http://c.pki.goog/r/gsr1.crl
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          142.250.200.3:80
          Request
          GET /r/gsr1.crl HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Microsoft-CryptoAPI/10.0
          Host: c.pki.goog
          Response
          HTTP/1.1 200 OK
          Accept-Ranges: bytes
          Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
          Cross-Origin-Resource-Policy: cross-origin
          Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
          Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
          Content-Length: 1739
          X-Content-Type-Options: nosniff
          Server: sffe
          X-XSS-Protection: 0
          Date: Sat, 30 Nov 2024 14:40:25 GMT
          Expires: Sat, 30 Nov 2024 15:30:25 GMT
          Cache-Control: public, max-age=3000
          Age: 2185
          Last-Modified: Mon, 07 Oct 2024 07:18:00 GMT
          Content-Type: application/pkix-crl
          Vary: Accept-Encoding
        • flag-gb
          GET
          http://c.pki.goog/r/r4.crl
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          142.250.200.3:80
          Request
          GET /r/r4.crl HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Microsoft-CryptoAPI/10.0
          Host: c.pki.goog
          Response
          HTTP/1.1 200 OK
          Accept-Ranges: bytes
          Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
          Cross-Origin-Resource-Policy: cross-origin
          Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
          Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
          Content-Length: 436
          X-Content-Type-Options: nosniff
          Server: sffe
          X-XSS-Protection: 0
          Date: Sat, 30 Nov 2024 14:40:37 GMT
          Expires: Sat, 30 Nov 2024 15:30:37 GMT
          Cache-Control: public, max-age=3000
          Age: 2173
          Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
          Content-Type: application/pkix-crl
          Vary: Accept-Encoding
        • flag-us
          DNS
          220.139.67.172.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          220.139.67.172.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          3.200.250.142.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          3.200.250.142.in-addr.arpa
          IN PTR
          Response
          3.200.250.142.in-addr.arpa
          IN PTR
          lhr48s29-in-f31e100net
        • flag-us
          DNS
          209.205.72.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          209.205.72.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          GET
          https://api.2ip.ua/geo.json
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          172.67.139.220:443
          Request
          GET /geo.json HTTP/1.1
          User-Agent: Microsoft Internet Explorer
          Host: api.2ip.ua
          Response
          HTTP/1.1 200 OK
          Date: Sat, 30 Nov 2024 15:16:54 GMT
          Content-Type: application/json
          Transfer-Encoding: chunked
          Connection: keep-alive
          strict-transport-security: max-age=63072000; preload
          x-frame-options: SAMEORIGIN
          x-content-type-options: nosniff
          x-xss-protection: 1; mode=block; report=...
          access-control-allow-origin: *
          access-control-allow-methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
          access-control-allow-headers: X-Accept-Charset,X-Accept,Content-Type
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DP8DoiRdn31KktH4arbbsMQeHVFgmv4ZYiD3A7gjwy8tBMHUKkd1xNU4QwL0T%2B8Wzdm5vJ%2BH3KX%2FvfEI5Imt1tsH0aoZJUS1BZ37dfOpOhqhMWEZDucbo5XuDDna"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 8eabcd1fc84279b8-LHR
          alt-svc: h3=":443"; ma=86400
          server-timing: cfL4;desc="?proto=TCP&rtt=193002&min_rtt=27259&rtt_var=164245&sent=6&recv=8&lost=0&retrans=0&sent_bytes=3266&recv_bytes=384&delivery_rate=148636&cwnd=253&unsent_bytes=0&cid=3bbe9d30c7e5b710&ts=138&x=0"
        • flag-us
          DNS
          ymad.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          ymad.ug
          IN A
          Response
        • flag-us
          DNS
          loot.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          loot.ug
          IN A
          Response
        • flag-us
          DNS
          loot.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          loot.ug
          IN A
          Response
        • flag-us
          DNS
          loot.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          loot.ug
          IN A
          Response
        • flag-us
          DNS
          loot.ug
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          8.8.8.8:53
          Request
          loot.ug
          IN A
          Response
        • flag-us
          DNS
          56.163.245.4.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          56.163.245.4.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          206.23.85.13.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          206.23.85.13.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          172.214.232.199.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          172.214.232.199.in-addr.arpa
          IN PTR
          Response
        • flag-us
          GET
          https://api.2ip.ua/geo.json
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          172.67.139.220:443
          Request
          GET /geo.json HTTP/1.1
          User-Agent: Microsoft Internet Explorer
          Host: api.2ip.ua
          Response
          HTTP/1.1 200 OK
          Date: Sat, 30 Nov 2024 15:17:21 GMT
          Content-Type: application/json
          Transfer-Encoding: chunked
          Connection: keep-alive
          strict-transport-security: max-age=63072000; preload
          x-frame-options: SAMEORIGIN
          x-content-type-options: nosniff
          x-xss-protection: 1; mode=block; report=...
          access-control-allow-origin: *
          access-control-allow-methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
          access-control-allow-headers: X-Accept-Charset,X-Accept,Content-Type
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2B0ScBlNGDLwGK%2Fqjc9v0w1gh3O3DX5SxatfP7IViu6o0g3zMJ1ejAI9FKiksMM%2BvMqsutWPmGhm0iiphCBM8e3SjFZM24dn%2FOUhzr1ZYiX91nzbRl3KQLooPDlDk"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 8eabcdca3927768b-LHR
          alt-svc: h3=":443"; ma=86400
          server-timing: cfL4;desc="?proto=TCP&rtt=37041&min_rtt=33586&rtt_var=9288&sent=6&recv=9&lost=0&retrans=0&sent_bytes=3265&recv_bytes=384&delivery_rate=92149&cwnd=253&unsent_bytes=0&cid=72ed4df2fc6d40dd&ts=162&x=0"
        • flag-us
          GET
          https://api.2ip.ua/geo.json
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          172.67.139.220:443
          Request
          GET /geo.json HTTP/1.1
          User-Agent: Microsoft Internet Explorer
          Host: api.2ip.ua
          Response
          HTTP/1.1 429 Too Many Requests
          Date: Sat, 30 Nov 2024 15:17:21 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: keep-alive
          strict-transport-security: max-age=63072000; preload
          x-frame-options: SAMEORIGIN
          x-content-type-options: nosniff
          x-xss-protection: 1; mode=block; report=...
          access-control-allow-origin: *
          access-control-allow-methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
          access-control-allow-headers: X-Accept-Charset,X-Accept,Content-Type
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pqkI2DVhNB1rQH%2F1TOREnlh8QtImNeDtHhfM0BjhimU0w6B7%2Fo4muUT3wq4VI7A25JcZJMXOm9CfSr1PJ3Fdk6H5%2F8gT1zoDBLxuDt6MHP%2BXB7OoFo9TSdnu2x2U"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 8eabcdca79559527-LHR
          alt-svc: h3=":443"; ma=86400
          server-timing: cfL4;desc="?proto=TCP&rtt=40273&min_rtt=26932&rtt_var=9909&sent=6&recv=9&lost=0&retrans=0&sent_bytes=3264&recv_bytes=384&delivery_rate=93534&cwnd=253&unsent_bytes=0&cid=c4c98559e0f7273c&ts=171&x=0"
        • flag-us
          GET
          https://api.2ip.ua/geo.json
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          Remote address:
          172.67.139.220:443
          Request
          GET /geo.json HTTP/1.1
          User-Agent: Microsoft Internet Explorer
          Host: api.2ip.ua
          Response
          HTTP/1.1 429 Too Many Requests
          Date: Sat, 30 Nov 2024 15:17:24 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: keep-alive
          strict-transport-security: max-age=63072000; preload
          x-frame-options: SAMEORIGIN
          x-content-type-options: nosniff
          x-xss-protection: 1; mode=block; report=...
          access-control-allow-origin: *
          access-control-allow-methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
          access-control-allow-headers: X-Accept-Charset,X-Accept,Content-Type
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=il%2FIcyAZF2DWHI%2FaDj8ohk59NwqjRxyqd6iQ7s67X4d3NBXQ8jg3pjPyP3QcBVj6o8exY0I8SKB86imAccPDEmm5ayqahU6BAj7fft7mF9fvTWOkmjaS%2BYTsxIVz"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 8eabcdde4a9288bb-LHR
          alt-svc: h3=":443"; ma=86400
          server-timing: cfL4;desc="?proto=TCP&rtt=27322&min_rtt=26361&rtt_var=5219&sent=6&recv=9&lost=0&retrans=0&sent_bytes=3264&recv_bytes=384&delivery_rate=153669&cwnd=244&unsent_bytes=0&cid=5650b738d3087920&ts=150&x=0"
        • 172.67.139.220:443
          https://api.2ip.ua/geo.json
          tls, http
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          1.0kB
          5.5kB
          14
          11

          HTTP Request

          GET https://api.2ip.ua/geo.json

          HTTP Response

          200
        • 142.250.200.3:80
          http://c.pki.goog/r/r4.crl
          http
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          556 B
          3.8kB
          7
          5

          HTTP Request

          GET http://c.pki.goog/r/gsr1.crl

          HTTP Response

          200

          HTTP Request

          GET http://c.pki.goog/r/r4.crl

          HTTP Response

          200
        • 172.67.139.220:443
          https://api.2ip.ua/geo.json
          tls, http
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          1.2kB
          5.5kB
          15
          11

          HTTP Request

          GET https://api.2ip.ua/geo.json

          HTTP Response

          200
        • 172.67.139.220:443
          https://api.2ip.ua/geo.json
          tls, http
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          1.0kB
          5.5kB
          14
          11

          HTTP Request

          GET https://api.2ip.ua/geo.json

          HTTP Response

          200
        • 172.67.139.220:443
          https://api.2ip.ua/geo.json
          tls, http
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          1.0kB
          5.9kB
          14
          11

          HTTP Request

          GET https://api.2ip.ua/geo.json

          HTTP Response

          429
        • 172.67.139.220:443
          https://api.2ip.ua/geo.json
          tls, http
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          1.0kB
          5.9kB
          14
          11

          HTTP Request

          GET https://api.2ip.ua/geo.json

          HTTP Response

          429
        • 8.8.8.8:53
          8.8.8.8.in-addr.arpa
          dns
          66 B
          90 B
          1
          1

          DNS Request

          8.8.8.8.in-addr.arpa

        • 8.8.8.8:53
          13.86.106.20.in-addr.arpa
          dns
          71 B
          157 B
          1
          1

          DNS Request

          13.86.106.20.in-addr.arpa

        • 8.8.8.8:53
          172.210.232.199.in-addr.arpa
          dns
          74 B
          128 B
          1
          1

          DNS Request

          172.210.232.199.in-addr.arpa

        • 8.8.8.8:53
          73.159.190.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          73.159.190.20.in-addr.arpa

        • 8.8.8.8:53
          95.221.229.192.in-addr.arpa
          dns
          73 B
          144 B
          1
          1

          DNS Request

          95.221.229.192.in-addr.arpa

        • 8.8.8.8:53
          api.2ip.ua
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          56 B
          88 B
          1
          1

          DNS Request

          api.2ip.ua

          DNS Response

          172.67.139.220
          104.21.65.24

        • 8.8.8.8:53
          c.pki.goog
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          56 B
          107 B
          1
          1

          DNS Request

          c.pki.goog

          DNS Response

          142.250.200.3

        • 8.8.8.8:53
          220.139.67.172.in-addr.arpa
          dns
          73 B
          135 B
          1
          1

          DNS Request

          220.139.67.172.in-addr.arpa

        • 8.8.8.8:53
          3.200.250.142.in-addr.arpa
          dns
          72 B
          110 B
          1
          1

          DNS Request

          3.200.250.142.in-addr.arpa

        • 8.8.8.8:53
          209.205.72.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          209.205.72.20.in-addr.arpa

        • 8.8.8.8:53
          ymad.ug
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          53 B
          117 B
          1
          1

          DNS Request

          ymad.ug

        • 8.8.8.8:53
          loot.ug
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          53 B
          117 B
          1
          1

          DNS Request

          loot.ug

        • 8.8.8.8:53
          loot.ug
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          53 B
          117 B
          1
          1

          DNS Request

          loot.ug

        • 8.8.8.8:53
          loot.ug
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          53 B
          117 B
          1
          1

          DNS Request

          loot.ug

        • 8.8.8.8:53
          loot.ug
          dns
          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          53 B
          117 B
          1
          1

          DNS Request

          loot.ug

        • 8.8.8.8:53
          56.163.245.4.in-addr.arpa
          dns
          71 B
          157 B
          1
          1

          DNS Request

          56.163.245.4.in-addr.arpa

        • 8.8.8.8:53
          206.23.85.13.in-addr.arpa
          dns
          71 B
          145 B
          1
          1

          DNS Request

          206.23.85.13.in-addr.arpa

        • 8.8.8.8:53
          172.214.232.199.in-addr.arpa
          dns
          74 B
          128 B
          1
          1

          DNS Request

          172.214.232.199.in-addr.arpa

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          1KB

          MD5

          67e486b2f148a3fca863728242b6273e

          SHA1

          452a84c183d7ea5b7c015b597e94af8eef66d44a

          SHA256

          facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

          SHA512

          d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          436B

          MD5

          971c514f84bba0785f80aa1c23edfd79

          SHA1

          732acea710a87530c6b08ecdf32a110d254a54c8

          SHA256

          f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

          SHA512

          43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          174B

          MD5

          db23f408971a71f89877f035049f793a

          SHA1

          d39528c733933bc0c0efa2fbd0f8c483ade2698a

          SHA256

          ee6875c4f9dc9b011de9a77d28e5e9aa40211ed110cb8b42d2379a21e3211887

          SHA512

          ea6629abd0b0f58d7499549a143e17120353da2d4c1300976e2c790350a7a00e87a2da0fcf05a7724eabee3c215805ba8a3fa4f3d781690059208945199517dd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          170B

          MD5

          48cd28c6cefe2d70ac244fda8271b894

          SHA1

          26e4d76ae611c52cb98ef1a1984fb5d97128906a

          SHA256

          094fe088445fbd0b74fdb89b79a15648a64af650aa3f925f22645636dc6f79e9

          SHA512

          b3177de594d77b8da019c1aa289a1bba7887cadf4faa2a31168e2b358fdac420ce4254c9f6c95116c02aa3a57ffadfb749476554ac48e1e484a3028f7ccbe5ec

        • C:\Users\Admin\AppData\Local\89c32495-4bb8-4ba4-b962-a87e3de91648\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

          Filesize

          669KB

          MD5

          ead18f3a909685922d7213714ea9a183

          SHA1

          1270bd7fd62acc00447b30f066bb23f4745869bf

          SHA256

          5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

          SHA512

          6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

        • C:\Users\Public\Documents\_readme.txt

          Filesize

          1KB

          MD5

          d75064cfaac9c92f52aadf373dc7e463

          SHA1

          36ea05181d9b037694929ec81f276f13c7d2655c

          SHA256

          163ec5b903b6baadd32d560c44c1ea4dce241579a7493eb32c632eae9085d508

          SHA512

          43387299749f31c623c5dd4a53ff4d2eff5edfeb80fd4e2edd45860b5c9367d2767ae2ee9b60824b57301999dd2bd995b7d3bd5e7187e447aed76106272559d1

        • memory/1852-2-0x0000000000840000-0x0000000000940000-memory.dmp

          Filesize

          1024KB

        • memory/1852-3-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1852-16-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/1852-17-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/1852-0-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/2132-28-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/2132-20-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/2132-27-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/2132-19-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/2132-29-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/2132-30-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/2132-14-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3688-36-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3688-35-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3688-41-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3688-46-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3688-32-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3928-37-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3928-34-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/3928-42-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4188-44-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        • memory/4188-45-0x0000000000400000-0x00000000004A9000-memory.dmp

          Filesize

          676KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.