URL:

http://keygenninja.com

Full analysis: https://app.any.run/tasks/49d0776c-8901-41ae-b472-71265dca3f6d
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: January 06, 2024, 16:58:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
azorult
fareit
pony
trojan
Indicators:
MD5:

990905F0DCF0A02804B6F0EF810BFB8A

SHA1:

338175D20F4CF8C12B271302536F1EF96A4CD250

SHA256:

69A8D22F3420AC36BEB01D15372AD1F5641C02B3BAA7F20A3E94E96E5342BC87

SSDEEP:

3:N1KVAVYI:CqiI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • key.exe (PID: 3660)
      • key.exe (PID: 604)
    • Starts CMD.EXE for self-deleting

      • keygen-step-3.exe (PID: 3764)
      • keygen-step-3.exe (PID: 3452)
    • Actions looks like stealing of personal data

      • key.exe (PID: 3660)
      • key.exe (PID: 604)
  • SUSPICIOUS

    • Reads the Internet Settings

      • EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru.exe (PID: 2460)
      • keygen-step-1.exe (PID: 3688)
      • cmd.exe (PID: 2920)
      • control.exe (PID: 3380)
      • keygen-step-3.exe (PID: 3764)
      • keygen-pj.exe (PID: 3696)
      • key.exe (PID: 3660)
      • key.exe (PID: 604)
      • keygen-step-3.exe (PID: 3452)
      • keygen-step-1.exe (PID: 1632)
    • Executing commands from a ".bat" file

      • EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru.exe (PID: 2460)
      • key.exe (PID: 3660)
      • key.exe (PID: 604)
    • Starts CMD.EXE for commands execution

      • EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru.exe (PID: 2460)
      • keygen-step-3.exe (PID: 3764)
      • key.exe (PID: 3660)
      • key.exe (PID: 604)
      • keygen-step-3.exe (PID: 3452)
    • Uses RUNDLL32.EXE to load library

      • control.exe (PID: 3380)
    • The process checks if it is being run in the virtual environment

      • rundll32.exe (PID: 2092)
    • Searches for installed software

      • key.exe (PID: 3660)
      • key.exe (PID: 604)
    • Checks Windows Trust Settings

      • keygen-step-3.exe (PID: 3764)
      • keygen-step-3.exe (PID: 3452)
    • Reads settings of System Certificates

      • keygen-step-3.exe (PID: 3764)
      • keygen-step-3.exe (PID: 3452)
    • Reads security settings of Internet Explorer

      • keygen-step-3.exe (PID: 3764)
      • keygen-step-3.exe (PID: 3452)
    • Accesses Microsoft Outlook profiles

      • key.exe (PID: 3660)
      • key.exe (PID: 604)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 1404)
      • firefox.exe (PID: 2036)
      • WinRAR.exe (PID: 1776)
    • Manual execution by a user

      • WinRAR.exe (PID: 1776)
      • EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru.exe (PID: 2460)
      • WinRAR.exe (PID: 2436)
      • WinRAR.exe (PID: 3492)
      • key.exe (PID: 604)
      • keygen-step-3.exe (PID: 3452)
      • keygen-step-1.exe (PID: 1632)
    • The process uses the downloaded file

      • firefox.exe (PID: 1404)
      • WinRAR.exe (PID: 1776)
    • Reads the computer name

      • EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru.exe (PID: 2460)
      • keygen-step-1.exe (PID: 3688)
      • keygen-pj.exe (PID: 3696)
      • keygen-step-3.exe (PID: 3764)
      • key.exe (PID: 3660)
      • key.exe (PID: 604)
      • keygen-step-3.exe (PID: 3452)
      • keygen-step-1.exe (PID: 1632)
    • Drops the executable file immediately after the start

      • EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru.exe (PID: 2460)
      • keygen-pj.exe (PID: 3696)
      • WinRAR.exe (PID: 1656)
      • WinRAR.exe (PID: 3492)
      • WinRAR.exe (PID: 2436)
    • Checks supported languages

      • EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru.exe (PID: 2460)
      • keygen-step-1.exe (PID: 3688)
      • key.exe (PID: 3660)
      • keygen-pj.exe (PID: 3696)
      • keygen-step-3.exe (PID: 3764)
      • key.exe (PID: 604)
      • keygen-step-3.exe (PID: 3452)
      • keygen-step-1.exe (PID: 1632)
    • Create files in a temporary directory

      • EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru.exe (PID: 2460)
      • keygen-pj.exe (PID: 3696)
      • key.exe (PID: 604)
      • key.exe (PID: 3660)
    • The executable file from the user directory is run by the CMD process

      • keygen-step-1.exe (PID: 3688)
      • keygen-pj.exe (PID: 3696)
      • keygen-step-3.exe (PID: 3764)
    • Reads the machine GUID from the registry

      • keygen-step-1.exe (PID: 3688)
      • keygen-step-3.exe (PID: 3764)
      • keygen-step-3.exe (PID: 3452)
      • keygen-step-1.exe (PID: 1632)
    • Reads product name

      • keygen-step-1.exe (PID: 3688)
      • keygen-step-1.exe (PID: 1632)
    • Checks proxy server information

      • keygen-step-1.exe (PID: 3688)
      • keygen-step-3.exe (PID: 3764)
      • keygen-step-3.exe (PID: 3452)
      • keygen-step-1.exe (PID: 1632)
    • AZORULT has been detected (SURICATA)

      • keygen-step-1.exe (PID: 3688)
    • Creates files or folders in the user directory

      • keygen-step-3.exe (PID: 3764)
    • Connects to the CnC server

      • keygen-step-1.exe (PID: 3688)
      • key.exe (PID: 3660)
      • key.exe (PID: 604)
    • Reads Environment values

      • keygen-step-1.exe (PID: 3688)
      • keygen-step-1.exe (PID: 1632)
    • PONY has been detected (SURICATA)

      • key.exe (PID: 3660)
      • key.exe (PID: 604)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
86
Monitored processes
36
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe no specs winrar.exe no specs PhotoViewer.dll no specs easeus_data_recovery_wizard_keygen_by_keygenguru.exe no specs cmd.exe no specs keygen-pj.exe no specs #AZORULT keygen-step-1.exe control.exe no specs keygen-step-3.exe rundll32.exe no specs #PONY key.exe cmd.exe no specs ping.exe no specs cmd.exe no specs winrar.exe no specs winrar.exe no specs #PONY key.exe cmd.exe no specs keygen-step-3.exe cmd.exe no specs ping.exe no specs keygen-step-1.exe

Process information

PID
CMD
Path
Indicators
Parent process
532"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1404.0.527385228\2077348706" -parentBuildID 20230710165010 -prefsHandle 1120 -prefMapHandle 1112 -prefsLen 28523 -prefMapSize 244195 -appDir "C:\Program Files\Mozilla Firefox\browser" - {42944129-1829-458d-89b5-24877b0116f5} 1404 "\\.\pipe\gecko-crash-server-pipe.1404" 1192 d9a9bd0 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
1
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
604"C:\Users\admin\Desktop\EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru\keygen-pj\key.exe" C:\Users\admin\Desktop\EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru\keygen-pj\key.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\easeus_data_recovery_wizard_keygen_by_keygenguru\keygen-pj\key.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
764ping 127.0.0.1 C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
908C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\1005125.bat" "C:\Users\admin\AppData\Local\Temp\RarSFX1\key.exe" "C:\Windows\System32\cmd.exekey.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1404"C:\Program Files\Mozilla Firefox\firefox.exe" http://keygenninja.comC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1504"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1404.1.1962492206\1947218195" -parentBuildID 20230710165010 -prefsHandle 1428 -prefMapHandle 1424 -prefsLen 28600 -prefMapSize 244195 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a18074f0-2610-426c-985c-4f5a8ce33070} 1404 "\\.\pipe\gecko-crash-server-pipe.1404" 1440 f31bc20 socketC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1628"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1404.9.1245331589\603468069" -childID 8 -isForBrowser -prefsHandle 2368 -prefMapHandle 3556 -prefsLen 29313 -prefMapSize 244195 -jsInitHandle 924 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {04b62999-939a-4aa6-9a96-90ceb7032c84} 1404 "\\.\pipe\gecko-crash-server-pipe.1404" 4452 17205c90 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1632"C:\Users\admin\Desktop\EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru\keygen-step-1.exe" C:\Users\admin\Desktop\EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru\keygen-step-1.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\easeus_data_recovery_wizard_keygen_by_keygenguru\keygen-step-1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1656"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa1776.32893\EASEUS_Data_Recovery_Wizard_keygen_by_KeyGenGuru.zipC:\Program Files\WinRAR\WinRAR.exeWinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1740"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1404.2.1578992430\80149472" -childID 1 -isForBrowser -prefsHandle 2068 -prefMapHandle 2064 -prefsLen 24556 -prefMapSize 244195 -jsInitHandle 924 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7b842fe-4bab-4c94-b816-6fbbf3824621} 1404 "\\.\pipe\gecko-crash-server-pipe.1404" 2080 1183a3f0 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
Total events
32 671
Read events
32 281
Write events
390
Delete events
0

Modification events

(PID) Process:(2036) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
2166C0A101000000
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
044CC1A101000000
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Theme
Value:
1
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Enabled
Value:
1
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SetDefaultBrowserUserChoice
Value:
1
(PID) Process:(1404) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|AppLastRunTime
Value:
D14E5F3C23B0D901
Executable files
11
Suspicious files
176
Text files
43
Unknown types
0

Dropped files

PID
Process
Filename
Type
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1404firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:B7A3C61D0C144CC5E166B1E769CA8F8C
SHA256:7FADCB77FFACA6B9E9F15C6F1CD3AAD4C20DCD90FA92429A627A3A7110CA2644
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:60E0DE9E05EC76C749D80F0D15A81B21
SHA256:08252FA62CCCCD316474E20CC7317A6B5C932B2C972234318E8CCDA39EC2EF48
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:60E0DE9E05EC76C749D80F0D15A81B21
SHA256:08252FA62CCCCD316474E20CC7317A6B5C932B2C972234318E8CCDA39EC2EF48
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cert9.db-journalbinary
MD5:5989F90AF9AD0F218841C6AB99A3AE02
SHA256:79113F38B2302765172E494437131BE3A3966B42F142BAAA61D485818F0B0763
1404firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
33
TCP/UDP connections
84
DNS requests
170
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1404
firefox.exe
GET
301
188.114.96.3:80
http://keygenninja.com/
unknown
unknown
1404
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
text
8 b
unknown
1404
firefox.exe
POST
200
142.250.185.227:80
http://ocsp.pki.goog/gts1c3
unknown
binary
471 b
unknown
1404
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
text
90 b
unknown
1404
firefox.exe
POST
200
95.101.54.139:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
1404
firefox.exe
POST
95.101.54.139:80
http://r3.o.lencr.org/
unknown
unknown
1404
firefox.exe
POST
95.101.54.139:80
http://r3.o.lencr.org/
unknown
unknown
1404
firefox.exe
POST
200
95.101.54.139:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
1404
firefox.exe
POST
200
95.101.54.137:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
1404
firefox.exe
POST
200
95.101.54.139:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1404
firefox.exe
188.114.97.3:443
keygenninja.com
unknown
1404
firefox.exe
188.114.96.3:80
keygenninja.com
CLOUDFLARENET
NL
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
1404
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
1404
firefox.exe
34.117.237.239:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown
1404
firefox.exe
44.205.134.14:443
spocs.getpocket.com
AMAZON-AES
US
unknown
1404
firefox.exe
34.107.243.93:443
push.services.mozilla.com
GOOGLE
US
unknown
1404
firefox.exe
142.250.186.74:443
safebrowsing.googleapis.com
whitelisted

DNS requests

Domain
IP
Reputation
keygenninja.com
  • 188.114.96.3
  • 188.114.97.3
  • 2a06:98c1:3120::3
  • 2a06:98c1:3121::3
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.117.237.239
whitelisted
spocs.getpocket.com
  • 44.205.134.14
  • 44.215.47.169
  • 54.81.18.32
  • 3.231.97.13
shared
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
proxyserverecs-1736642167.us-east-1.elb.amazonaws.com
  • 44.205.134.14
  • 44.215.47.169
  • 54.81.18.32
  • 3.231.97.13
shared
r3.o.lencr.org
  • 95.101.54.139
  • 2.16.202.123
  • 95.101.54.217
  • 95.101.54.107
  • 95.101.54.112
  • 95.101.54.138
  • 95.101.54.137
shared
firefox.settings.services.mozilla.com
  • 34.149.100.209
whitelisted

Threats

PID
Process
Class
Message
3688
keygen-step-1.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/AZORult V3.3 Client Checkin M2
3764
keygen-step-3.exe
Misc activity
ET INFO Observed ZeroSSL SSL/TLS Certificate
3660
key.exe
Malware Command and Control Activity Detected
ET MALWARE Fareit/Pony Downloader Checkin 2
3660
key.exe
A Network Trojan was detected
ET MALWARE Trojan Generic - POST To gate.php with no referer
3660
key.exe
Potentially Bad Traffic
ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
604
key.exe
Malware Command and Control Activity Detected
ET MALWARE Fareit/Pony Downloader Checkin 2
604
key.exe
A Network Trojan was detected
ET MALWARE Trojan Generic - POST To gate.php with no referer
3452
keygen-step-3.exe
Misc activity
ET INFO Observed ZeroSSL SSL/TLS Certificate
Malware Command and Control Activity Detected
ET MALWARE Win32/AZORult V3.3 Client Checkin M2
6 ETPRO signatures available at the full report
No debug info