File name:

SaMarinDa Free (V3-VPS) (1).zip

Full analysis: https://app.any.run/tasks/ce20ec04-75d4-49aa-9f9f-1aa2a585371d
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 29, 2024, 10:23:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
hiloti
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

4A1FB389DE318C7EE4FEC0F8498450A0

SHA1:

F61E20994ECCCFDF0C636F6D33F847B3227E41B0

SHA256:

D5B7CAE94E6E84C39D8706B8CDA7195912EF203503F25411729D739734EF9F04

SSDEEP:

768:U3A58jP9V4+zz1+xkn4eWj/vMhvmgiY90:eA69S+zzwmiMhvmC90

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3984)
      • LoaderSMD.exe (PID: 328)
      • TokenSMD.exe (PID: 1488)
    • HILOTI has been detected (SURICATA)

      • TokenSMD.exe (PID: 1488)
  • SUSPICIOUS

    • Reads the Internet Settings

      • LoaderSMD.exe (PID: 328)
      • WMIC.exe (PID: 1664)
      • WMIC.exe (PID: 1788)
      • WMIC.exe (PID: 1944)
      • TokenSMD.exe (PID: 1488)
    • Reads security settings of Internet Explorer

      • LoaderSMD.exe (PID: 328)
      • TokenSMD.exe (PID: 1488)
    • Executable content was dropped or overwritten

      • LoaderSMD.exe (PID: 328)
      • TokenSMD.exe (PID: 1488)
    • Connects to the server without a host name

      • LoaderSMD.exe (PID: 328)
      • TokenSMD.exe (PID: 1488)
    • Starts CMD.EXE for commands execution

      • TokenSMD.exe (PID: 1488)
    • Uses WMIC.EXE to obtain CPU information

      • cmd.exe (PID: 1132)
    • Reads settings of System Certificates

      • TokenSMD.exe (PID: 1488)
    • Checks Windows Trust Settings

      • TokenSMD.exe (PID: 1488)
    • Uses WMIC.EXE to obtain physical disk drive information

      • cmd.exe (PID: 1824)
    • Uses WMIC.EXE to obtain BIOS management information

      • cmd.exe (PID: 588)
    • Start notepad (likely ransomware note)

      • TokenSMD.exe (PID: 1488)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3984)
    • Manual execution by a user

      • LoaderSMD.exe (PID: 1024)
      • LoaderSMD.exe (PID: 328)
      • chrome.exe (PID: 2520)
      • wmpnscfg.exe (PID: 2080)
    • Reads the computer name

      • LoaderSMD.exe (PID: 328)
      • TokenSMD.exe (PID: 1488)
      • wmpnscfg.exe (PID: 2080)
    • Checks proxy server information

      • LoaderSMD.exe (PID: 328)
      • TokenSMD.exe (PID: 1488)
    • Checks supported languages

      • LoaderSMD.exe (PID: 328)
      • TokenSMD.exe (PID: 1488)
      • wmpnscfg.exe (PID: 2080)
    • Create files in a temporary directory

      • LoaderSMD.exe (PID: 328)
      • TokenSMD.exe (PID: 1488)
    • Creates files or folders in the user directory

      • LoaderSMD.exe (PID: 328)
      • TokenSMD.exe (PID: 1488)
    • Reads the machine GUID from the registry

      • LoaderSMD.exe (PID: 328)
      • TokenSMD.exe (PID: 1488)
    • Reads the software policy settings

      • TokenSMD.exe (PID: 1488)
    • Application launched itself

      • chrome.exe (PID: 2520)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:04:20 16:49:00
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: SaMarinDa Free (V3-VPS)/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
66
Monitored processes
27
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe loadersmd.exe no specs loadersmd.exe #HILOTI tokensmd.exe cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmpnscfg.exe no specs notepad.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
328"C:\Users\admin\Desktop\SaMarinDa Free (V3-VPS)\LoaderSMD.exe" C:\Users\admin\Desktop\SaMarinDa Free (V3-VPS)\LoaderSMD.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\samarinda free (v3-vps)\loadersmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
588C:\Windows\system32\cmd.exe /c wmic bios get serialnumber >> C:\Users\admin\AppData\Local\Temp\s15c.0C:\Windows\System32\cmd.exeTokenSMD.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
848"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1540 --field-trial-handle=1140,i,6869854326115857340,18364732624464005570,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
960"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=1336 --field-trial-handle=1140,i,6869854326115857340,18364732624464005570,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1024"C:\Users\admin\Desktop\SaMarinDa Free (V3-VPS)\LoaderSMD.exe" C:\Users\admin\Desktop\SaMarinDa Free (V3-VPS)\LoaderSMD.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\samarinda free (v3-vps)\loadersmd.exe
c:\windows\system32\ntdll.dll
1132C:\Windows\system32\cmd.exe /c wmic cpu get processorid >> C:\Users\admin\AppData\Local\Temp\s15c.1C:\Windows\System32\cmd.exeTokenSMD.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1488"C:\Users\admin\AppData\Local\Temp\SMD\TokenSMD.exe" C:\Users\admin\AppData\Local\Temp\SMD\TokenSMD.exe
LoaderSMD.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\smd\tokensmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
1612"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1088 --field-trial-handle=1140,i,6869854326115857340,18364732624464005570,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1664wmic bios get serialnumber C:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
1788wmic diskdrive get serialnumber C:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
18 011
Read events
17 888
Write events
107
Delete events
16

Modification events

(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3984) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\SaMarinDa Free (V3-VPS) (1).zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
7
Suspicious files
32
Text files
27
Unknown types
30

Dropped files

PID
Process
Filename
Type
1488TokenSMD.exeC:\Users\admin\AppData\Local\Temp\smd.mnth
MD5:
SHA256:
2520chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF10bd95.TMP
MD5:
SHA256:
328LoaderSMD.exeC:\Users\admin\AppData\Local\Temp\SMD\TokenSMD.mentahexecutable
MD5:7AEB908F3B1D077A855BD65114333B58
SHA256:F0EF0A03BA6444A8B0C3BE3352887B67B453F3CF84A277C729C064E760EEF384
588cmd.exeC:\Users\admin\AppData\Local\Temp\s15c.0text
MD5:9025468F85256136F923096B01375964
SHA256:D5418014FA8E6E17D8992FD12C0DFECAC8A34855603EA58133E87EA09C2130DF
1488TokenSMD.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:4EAA0800260DF59FCF95C10371D0AC57
SHA256:26FF7372CF60F991E69390DABCC8242229E8F40F76732CFD6DBAFADCE6B4700E
2520chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1132cmd.exeC:\Users\admin\AppData\Local\Temp\s15c.1text
MD5:32EF13E6C24998526C128CD76EB6AA21
SHA256:7562BA2F99E026E13DE3EEC64A25EA42EB5356F94BDA938C613B152560A3591F
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.6194\SaMarinDa Free (V3-VPS)\LoaderSMD.exeexecutable
MD5:C2027FDA2FB478230E2E65CCC47E54CD
SHA256:D46A03007680E994E2C83008C55A90907B9A2F88E13B9B86A4F0585284CD0F92
1488TokenSMD.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\status1[1].htmbinary
MD5:7215EE9C7D9DC229D2921A40E899EC5F
SHA256:36A9E7F1C95B82FFB99743E0C5C4CE95D83C9A430AAC59F84EF3CBFAB6145068
1488TokenSMD.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:E8CC5555F13CDB066736486320A37D25
SHA256:6ED3C6F1C51DEF63D0C3C0741B1DA4034DEAE35F76987EAAE48FB08DB40123F0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
43
DNS requests
101
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
328
LoaderSMD.exe
GET
200
103.187.146.29:80
http://103.187.146.29/samarinda/InjekKey.mentah
unknown
unknown
1488
TokenSMD.exe
GET
200
103.187.146.29:80
http://103.187.146.29/samarinda/FileKey.mentah
unknown
unknown
1488
TokenSMD.exe
GET
301
188.114.96.3:80
http://generatetoken.my.id/samarinda/Api/status1.php?e=58EC68DEEA78D0CA775A96491CA85B40&k=SMD
unknown
unknown
1488
TokenSMD.exe
GET
200
216.58.206.67:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
unknown
1488
TokenSMD.exe
GET
200
216.58.206.67:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D
unknown
unknown
1488
TokenSMD.exe
GET
304
104.85.249.155:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?20b9ad6b0f68bcbb
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
328
LoaderSMD.exe
103.187.146.29:80
Cloud Host Pte Ltd
ID
unknown
1488
TokenSMD.exe
103.187.146.29:80
Cloud Host Pte Ltd
ID
unknown
1488
TokenSMD.exe
188.114.96.3:80
generatetoken.my.id
CLOUDFLARENET
NL
unknown
1488
TokenSMD.exe
188.114.96.3:443
generatetoken.my.id
CLOUDFLARENET
NL
unknown
1488
TokenSMD.exe
104.85.249.155:80
ctldl.windowsupdate.com
Akamai International B.V.
PL
unknown
1488
TokenSMD.exe
216.58.206.67:80
ocsp.pki.goog
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
generatetoken.my.id
  • 188.114.96.3
  • 188.114.97.3
unknown
ctldl.windowsupdate.com
  • 104.85.249.155
  • 95.100.111.234
  • 104.85.249.96
  • 104.85.249.154
  • 104.85.249.120
  • 104.85.249.144
  • 104.85.249.147
  • 104.85.249.130
whitelisted
ocsp.pki.goog
  • 216.58.206.67
whitelisted
clientservices.googleapis.com
  • 142.250.184.227
whitelisted
accounts.google.com
  • 142.251.16.84
shared
www.google.com
  • 142.250.186.36
whitelisted
www.gstatic.com
  • 142.250.186.67
whitelisted
apis.google.com
  • 142.250.181.238
whitelisted
update.googleapis.com
  • 142.250.186.131
unknown
www.samarindacheat.com
  • 212.224.93.245
unknown

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
Misc activity
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1488
TokenSMD.exe
Potentially Bad Traffic
ET HUNTING Hiloti Style GET to PHP with invalid terse MSIE headers
960
chrome.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 54
No debug info