Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- * ID: 1310
- * MalFamily: "Nanocore"
- * MalScore: 10.0
- * File Name: "Exes_3a3d8f2ab075fc4f6f4459b990122893.exe"
- * File Size: 1418533
- * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
- * SHA256: "2d24a45f5f85c0bfc188f4ccdd3fe76fe01a5380206eac7f2aff58bee2461aab"
- * MD5: "3a3d8f2ab075fc4f6f4459b990122893"
- * SHA1: "c90e5ba80f7094d0d7fc26de275d37e2b1595793"
- * SHA512: "9c915b840c32b405df9bbd3c3d237ed7477676f631e2ba047ffd5ad3ca4eca3dcb2a7f319de8c803f87c72c0edcba3dd913c8481e5080d9e424f6b858797662e"
- * CRC32: "22419E4F"
- * SSDEEP: "24576:8NA3R5drXgJ2tpFEhaxEeD8+N79kpOw/hu0n7ybw1ju1h6LId7nT1RMwaMm3CfBH:95E2vX1HN79k0Ou0QQS1h6LIdzTXM76x"
- * Process Execution:
- "38p47io7S3g3K7P.exe",
- "wscript.exe",
- "ihb.exe",
- "RegSvcs.exe"
- * Executed Commands:
- "\"C:\\Windows\\System32\\WScript.exe\" \"C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\cmw.vbs\"",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\cmw.vbs ",
- "\"C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\ihb.exe\" glb=cwb",
- "ihb.exe glb=cwb"
- * Signatures Detected:
- "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
- "Details":
- "Description": "Behavioural detection: Executable code extraction",
- "Details":
- "Description": "Attempts to connect to a dead IP:Port (1 unique times)",
- "Details":
- "IP_ioc": "41.189.44.89:2016 (Cote D'Ivoire)"
- "Description": "Guard pages use detected - possible anti-debugging.",
- "Details":
- "Description": "Detected script timer window indicative of sleep style evasion",
- "Details":
- "Window": "WSH-Timer"
- "Description": "A process attempted to delay the analysis task.",
- "Details":
- "Process": "RegSvcs.exe tried to sleep 814 seconds, actually delayed analysis time by 0 seconds"
- "Description": "At least one IP Address, Domain, or File Name was found in a crypto call",
- "Details":
- "ioc": "v2.0.50727"
- "Description": "Reads data out of its own binary image",
- "Details":
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00000000, length: 0x00000007"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00000000, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00000007, length: 0x0015a51e"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00001ff0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00003fe0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00005fd0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00007fc0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00009fb0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0000bfa0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0000df90, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0000ff80, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00011f70, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00013f60, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00015f50, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00017f40, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00019f30, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0001bf20, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0001df10, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0001ff00, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00021ef0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00023ee0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00025ed0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00027ec0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00029eb0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0002bea0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0002de90, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0002fe80, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00031e70, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00033e60, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00035e50, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00037e40, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00039e30, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0003be20, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0003de10, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0003fe00, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00041df0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00043de0, length: 0x00002000"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00045600, length: 0x0010e97e"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00154134, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0015433f, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00154548, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00154725, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00154919, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00154b1c, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00154d0e, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00154ee9, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x001550e4, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x001552c2, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x001554ed, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x001556c1, length: 0x00000029"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x001558b8, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00155ab9, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00155c82, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00155e5d, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0015604c, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0015624d, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00156424, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00156647, length: 0x00000029"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0015686e, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00156a5d, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00156c55, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00156e4a, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00157065, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0015727f, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00157450, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00157626, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x001577fc, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x001579d1, length: 0x00000027"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00157bad, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00157da0, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00157fa3, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0015817c, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00158361, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0015854a, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00158730, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00158919, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00158b21, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00158cf4, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00158ef1, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x001590df, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x001592cc, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x001594a3, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00159679, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0015986c, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00159a4e, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00159c49, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x00159e5a, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0015a028, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0015a22b, length: 0x00000028"
- "self_read": "process: 38p47io7S3g3K7P.exe, pid: 2540, offset: 0x0015a434, length: 0x0000001b"
- "self_read": "process: wscript.exe, pid: 1504, offset: 0x00000000, length: 0x00000040"
- "self_read": "process: wscript.exe, pid: 1504, offset: 0x000000f0, length: 0x00000018"
- "self_read": "process: wscript.exe, pid: 1504, offset: 0x000001e8, length: 0x00000078"
- "self_read": "process: wscript.exe, pid: 1504, offset: 0x00018000, length: 0x00000020"
- "self_read": "process: wscript.exe, pid: 1504, offset: 0x00018058, length: 0x00000018"
- "self_read": "process: wscript.exe, pid: 1504, offset: 0x000181a8, length: 0x00000018"
- "self_read": "process: wscript.exe, pid: 1504, offset: 0x00018470, length: 0x00000010"
- "self_read": "process: wscript.exe, pid: 1504, offset: 0x00018640, length: 0x00000012"
- "self_read": "process: RegSvcs.exe, pid: 3036, offset: 0x00000000, length: 0x00001000"
- "self_read": "process: RegSvcs.exe, pid: 3036, offset: 0x00000080, length: 0x00000200"
- "self_read": "process: RegSvcs.exe, pid: 3036, offset: 0x00000178, length: 0x00000200"
- "self_read": "process: RegSvcs.exe, pid: 3036, offset: 0x00005b20, length: 0x00000200"
- "self_read": "process: RegSvcs.exe, pid: 3036, offset: 0x00005b3c, length: 0x00000200"
- "Description": "A scripting utility was executed",
- "Details":
- "command": "\"C:\\Windows\\System32\\WScript.exe\" \"C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\cmw.vbs\""
- "Description": "Behavioural detection: Injection (Process Hollowing)",
- "Details":
- "Injection": "ihb.exe(2796) -> RegSvcs.exe(3036)"
- "Description": "Executed a process and injected code into it, probably while unpacking",
- "Details":
- "Injection": "ihb.exe(2796) -> RegSvcs.exe(3036)"
- "Description": "Behavioural detection: Injection (inter-process)",
- "Details":
- "Description": "Behavioural detection: Injection with CreateRemoteThread in a remote process",
- "Details":
- "Description": "Installs itself for autorun at Windows startup",
- "Details":
- "key": "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\\Windowsxxxxxxcccd"
- "data": "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\ihb.exe C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\GLB_CW~1"
- "Description": "Exhibits behavior characteristic of Nanocore RAT",
- "Details":
- "Description": "Stack pivoting was detected when using a critical API",
- "Details":
- "process": "38p47io7S3g3K7P.exe:2540"
- "Description": "Creates a hidden or system file",
- "Details":
- "file": "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\ihb.exe"
- "file": "C:\\Users\\user\\AppData\\Local\\Temp\\00881883"
- "file": "C:\\Users\\user\\temp"
- "Description": "File has been identified by 25 Antiviruses on VirusTotal as malicious",
- "Details":
- "K7AntiVirus": "Riskware ( 0040eff71 )"
- "K7GW": "Riskware ( 0040eff71 )"
- "Cybereason": "malicious.80f709"
- "APEX": "Malicious"
- "ClamAV": "Win.Malware.Mycop-6983471-0"
- "Kaspersky": "HEUR:Trojan-Dropper.Win32.Generic"
- "Invincea": "heuristic"
- "McAfee-GW-Edition": "BehavesLike.Win32.Backdoor.tc"
- "Trapmine": "suspicious.low.ml.score"
- "FireEye": "Generic.mg.3a3d8f2ab075fc4f"
- "Cyren": "W32/AutoIt.EN.gen!Eldorado"
- "Avira": "DR/AutoIt.Gen"
- "Antiy-AVL": "TrojanArcBomb/Win32.Agent"
- "Microsoft": "Trojan:Win32/AutoitInject.BI!MTB"
- "AegisLab": "Trojan.BAT.Crypter.tqa8"
- "ZoneAlarm": "HEUR:Trojan-Dropper.Win32.Generic"
- "AhnLab-V3": "Malware/Win32.RL_Generic.R286428"
- "Malwarebytes": "Trojan.MalPack.AISFX"
- "Zoner": "Probably RARAutorun"
- "ESET-NOD32": "VBS/Runner.NHZ"
- "Rising": "Trojan.Pack-RAR!1.BB61 (CLASSIC)"
- "Yandex": "Trojan.Agent!nS7qVYN4VgU"
- "Fortinet": "W32/Generic.AC.45A0E1!tr"
- "CrowdStrike": "win/malicious_confidence_80% (D)"
- "Qihoo-360": "HEUR/QVM10.1.BB1B.Malware.Gen"
- "Description": "Clamav Hits in Target/Dropped/SuriExtracted",
- "Details":
- "target": "clamav:Win.Malware.Mycop-6983471-0, sha256:2d24a45f5f85c0bfc188f4ccdd3fe76fe01a5380206eac7f2aff58bee2461aab, type:PE32 executable (GUI) Intel 80386, for MS Windows"
- "dropped": "clamav:Win.Trojan.Autoit-6922942-0, sha256:fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b , guest_paths:C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\ihb.exe, type:PE32 executable (GUI) Intel 80386, for MS Windows"
- "Description": "Drops a binary and executes it",
- "Details":
- "binary": "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\ihb.exe"
- "Description": "Collects information to fingerprint the system",
- "Details":
- * Started Service:
- * Mutexes:
- "DefaultTabtip-MainUI",
- "Local\\ZoneAttributeCacheCounterMutex",
- "Local\\ZonesCacheCounterMutex",
- "Local\\ZonesLockedCacheCounterMutex",
- "Global\\CLR_PerfMon_WrapMutex",
- "Global\\CLR_CASOFF_MUTEX",
- "Global\\c54fcd61-c763-48a4-a02b-9edc721c5ec9",
- "Global\\.net clr networking"
- * Modified Files:
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\__tmp_rar_sfx_access_check_26294765",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\cqe.mp3",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\glb=cwb",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\cmw.vbs",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\ihb.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\gtb.dll",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\krh.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\cim.xl",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\vcu.ini",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\bak.dat",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\qgu.jpg",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\csk.ppt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\qox.ico",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\jwe.icm",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\kes.ini",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\hdk.docx",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\dfo.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\nhe.pdf",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\ntv.jpg",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\jho.mp3",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\gol.dll",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\cak.mp3",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\pob.mp3",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\gme.dat",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\wpg.dat",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\gfu.txt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\bem.ppt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\oxn.txt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\dxo.jpg",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\dde.xml",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\uja.ico",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\gpl.xml",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\jct.mp3",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\rdi.docx",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\jho.ico",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\uqc.cpl",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\vjj.bmp",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\mwl.msc",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\kvo.bin",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\wvi.icm",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\dex.icm",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\ntr.docx",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\qdb.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\aat.pdf",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\mvl.xls",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\evw.dll",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\lhv.mp3",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\fxr.icm",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\cwh.bin",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\trg.bmp",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\dof.ini",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\mcp.xl",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\tpi.icm",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\rpa.jpg",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\cdw.msc",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\tkg.mp3",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\awg.icm",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\omt.msc",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\brv.txt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\fgk.dll",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\njk.xls",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\dnk.xls",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\rvl.xml",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\ktl.txt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\pfm.log",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\oqx.msc",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\xnj.xls",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\rwf.msc",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\ssh.log",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\jfh.mp3",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\nqm.cpl",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\xap.bin",
- "C:\\Users\\user\\AppData\\Local\\Temp\\00881883\\ecn.log",
- "C:\\Users\\user\\temp\\cqe.mp3",
- "C:\\Users\\user\\AppData\\Roaming\\C1515A12-1764-4632-ACE9-A9DFF9253200\\run.dat"
- * Deleted Files:
- * Modified Registry Keys:
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\UNCAsIntranet",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\AutoDetect",
- "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\LanguageList",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\\Windowsxxxxxxcccd"
- * Deleted Registry Keys:
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProxyBypass",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProxyBypass",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\IntranetName",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\IntranetName"
- * DNS Communications:
- "type": "A",
- "request": "bloc2020.ddns.net",
- "answers":
- "data": "41.189.44.89",
- "type": "A"
- * Domains:
- "ip": "41.189.44.89",
- "domain": "bloc2020.ddns.net"
- * Network Communication - ICMP:
- * Network Communication - HTTP:
- * Network Communication - SMTP:
- * Network Communication - Hosts:
- "country_name": "Cote D'Ivoire",
- "ip": "41.189.44.89",
- "inaddrarpa": "",
- "hostname": "bloc2020.ddns.net"
- * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement