File name:

Wave-Executor-master.zip

Full analysis: https://app.any.run/tasks/58999663-7dc2-4b3f-b808-ca452eba5dad
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 05, 2025, 16:07:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
lumma
stealer
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

19AE9F95C107D9A1D9E8DF04708B5B9A

SHA1:

BC7408E2A870600384C017C708285D9F3DC2AFAB

SHA256:

3A703FE4BC4E4C19F7569B7BA00F1D4DC75BDFFC605528E588E54FD789A51301

SSDEEP:

98304:Mz/egMVqR2/A/l9iRXmtmMhfYMgnZrN2JZP8peIWaKywbCXazqa6LGirgjlqxDh6:idj6p3RcIjtavOJIoZI5jtavOJIoZIC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2192)
      • aspnet_regiis.exe (PID: 7132)
    • Connects to the CnC server

      • svchost.exe (PID: 2192)
    • LUMMA mutex has been found

      • aspnet_regiis.exe (PID: 7132)
    • Actions looks like stealing of personal data

      • aspnet_regiis.exe (PID: 7132)
    • Steals credentials from Web Browsers

      • aspnet_regiis.exe (PID: 7132)
    • LUMMA has been detected (YARA)

      • aspnet_regiis.exe (PID: 7132)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6484)
    • Contacting a server suspected of hosting an CnC

      • aspnet_regiis.exe (PID: 7132)
      • svchost.exe (PID: 2192)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 6484)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 6484)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6484)
    • Connects to the server without a host name

      • aspnet_regiis.exe (PID: 7132)
    • Process requests binary or script from the Internet

      • aspnet_regiis.exe (PID: 7132)
    • Executable content was dropped or overwritten

      • Wave.exe (PID: 7052)
  • INFO

    • Reads the computer name

      • Wave.exe (PID: 7052)
      • aspnet_regiis.exe (PID: 7132)
      • MpCmdRun.exe (PID: 1140)
      • MpCmdRun.exe (PID: 7012)
    • Reads the software policy settings

      • aspnet_regiis.exe (PID: 7132)
    • Checks supported languages

      • aspnet_regiis.exe (PID: 7132)
      • MpCmdRun.exe (PID: 7012)
      • MpCmdRun.exe (PID: 1140)
      • Wave.exe (PID: 7052)
    • Reads the machine GUID from the registry

      • aspnet_regiis.exe (PID: 7132)
    • Manual execution by a user

      • Wave.exe (PID: 7052)
    • Create files in a temporary directory

      • MpCmdRun.exe (PID: 7012)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6484)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6484)
    • Creates files or folders in the user directory

      • Wave.exe (PID: 7052)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:01:04 08:07:52
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Wave-Executor-master/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
11
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs wave.exe conhost.exe no specs #LUMMA aspnet_regiis.exe cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs #LUMMA svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1140"C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR6484.12172"C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
4.18.1909.6 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2212\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6256C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR6484.12172\Rar$Scan80424.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
6484"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Wave-Executor-master.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6948C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942\Rar$Scan28150.bat" "C:\Windows\System32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
6956\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7012"C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942"C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
4.18.1909.6 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
7052"C:\Users\admin\Desktop\Wave.exe" C:\Users\admin\Desktop\Wave.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
yellow ponder construct.exe
Exit code:
0
Version:
9.4.3.3
Modules
Images
c:\users\admin\desktop\wave.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7060\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWave.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
5 108
Read events
5 098
Write events
10
Delete events
0

Modification events

(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Wave-Executor-master.zip
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6484) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\VirusScan
Operation:writeName:DefScanner
Value:
Windows Defender
Executable files
1
Suspicious files
6
Text files
301
Unknown types
0

Dropped files

PID
Process
Filename
Type
6484WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942\Wave-Executor-master.zip\Wave-Executor-master\.idea\codeStyles\Project.xmltext
MD5:4F587234B0249796EA2B568A0F074D09
SHA256:3E6E800773B39B852A3CCFAF00CFE423A6FAB2B454110FE0965E65A14D217B51
6484WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942\Wave-Executor-master.zip\Wave-Executor-master\.idea\gradle.xmlxml
MD5:630BDAAADA40B14E4C5A3899762EC2F0
SHA256:9744F825593089C7CC7A25E725E2CADDD512CA1EEAB08E69DEE08CD3DA97795C
6484WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942\Wave-Executor-master.zip\Wave-Executor-master\app\proguard-rules.protext
MD5:ADF6F233B18261975991F1825834AFC7
SHA256:1CF8C57E8F79C250B0AF9C1A5A4EDAD71A5C348A79AB70243B6BAE086C150AD2
6484WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942\Wave-Executor-master.zip\Wave-Executor-master\app\release\output.jsonini
MD5:2E51CB0F4FB2A64351AEDFCB707CAF26
SHA256:0C6086E086013FA78597A4BC1558695E831407A0D1574F1533EB6C20E77FE82D
6484WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942\Wave-Executor-master.zip\Wave-Executor-master\.idea\runConfigurations.xmlxml
MD5:E9E1B64A01DAA4C987B8FB1E927D8273
SHA256:42D6B42D21F506765A2C77D216C7747B3BD8B9FAFB050EC2B3719A457C6343EC
6484WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942\Wave-Executor-master.zip\Wave-Executor-master\Wave.zipcompressed
MD5:0707A71B6509E07354C9D5D822D5E04B
SHA256:141F5C08E669F61C0B5343C4AB8B570FC3D74FAE27E1C8E0D026E45C2C93349C
6484WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942\Wave-Executor-master.zip\Wave-Executor-master\.idea\misc.xmlxml
MD5:45DB03D9E4AB5B65FD3A22407B791860
SHA256:9FC294279C6DB10BEDD87B2109C008CD60EAB9862EB7A35431932A0DD595F224
6484WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942\Wave-Executor-master.zip\Wave-Executor-master\README.mdtext
MD5:99AF5D699061B9561CF090C309AF1E98
SHA256:1948607A5EB75655814910082BB903EE043B530136606DEF309F3228B5AE1F99
6484WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942\Wave-Executor-master.zip\Wave-Executor-master\.idea\vcs.xmlxml
MD5:166ACEF3D301BD241D0D6DA15BC5AD3C
SHA256:55768F1F84FB117F1D0FC383E180B5D0AA5E5E6584C8C4A2995C15B4237F0972
6484WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR6484.6942\Wave-Executor-master.zip\Wave-Executor-master\app\src\main\AndroidManifest.xmlxml
MD5:EE26779B96C389A5969219191FF291A9
SHA256:17804933CE0E06E03013DD3675F25AE770179B93EA6F49562F7129A8A9B58F37
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
29
DNS requests
8
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6076
svchost.exe
GET
200
2.16.164.24:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.24:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.230.103:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6076
svchost.exe
GET
200
184.30.230.103:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7132
aspnet_regiis.exe
GET
147.45.47.81:80
http://147.45.47.81/conhost.exe
unknown
unknown
POST
200
104.21.96.1:443
https://fancywaxxers.shop/api
unknown
text
14 b
malicious
POST
200
104.21.32.1:443
https://fancywaxxers.shop/api
unknown
text
13.7 Kb
malicious
POST
200
104.21.32.1:443
https://fancywaxxers.shop/api
unknown
text
18.3 Kb
malicious
POST
200
104.21.112.1:443
https://fancywaxxers.shop/api
unknown
text
14 b
malicious
POST
200
104.21.48.1:443
https://fancywaxxers.shop/api
unknown
text
14 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
6076
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.23.227.205:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:138
whitelisted
6076
svchost.exe
2.16.164.24:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.24:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6076
svchost.exe
184.30.230.103:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
4712
MoUsoCoreWorker.exe
184.30.230.103:80
www.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
www.bing.com
  • 2.23.227.205
  • 2.23.227.202
  • 2.23.227.198
  • 2.23.227.208
unknown
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 2.16.164.24
  • 2.16.164.10
  • 2.16.164.129
  • 2.16.164.17
  • 2.16.164.107
  • 2.16.164.58
  • 2.16.164.49
  • 2.16.164.9
  • 2.16.164.122
whitelisted
www.microsoft.com
  • 184.30.230.103
whitelisted
fancywaxxers.shop
  • 104.21.32.1
  • 104.21.16.1
  • 104.21.96.1
  • 104.21.64.1
  • 104.21.48.1
  • 104.21.80.1
  • 104.21.112.1
malicious
self.events.data.microsoft.com
  • 20.42.65.90
unknown

Threats

PID
Process
Class
Message
7132
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)
2192
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop)
7132
aspnet_regiis.exe
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
7132
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)
7132
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)
7132
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)
7132
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)
7132
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)
7132
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)
7132
aspnet_regiis.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 23
No debug info