| File name: | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee |
| Full analysis: | https://app.any.run/tasks/0bc3183d-d362-462f-a8db-8c3eb91b0d81 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | May 18, 2025, 20:33:59 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | 00EE209D747977B8C5CD3F7F47D6038C |
| SHA1: | 434632427082D5E290320BCAFF46CE2F521174BF |
| SHA256: | DA234CEB68FF09EBA7AEEE175B2578221A34A2420FDD3DDE77F5817CA28EC685 |
| SSDEEP: | 24576:qqdPp2qM++Thxq3Vc2pBe77OMotfSCQF8:qqdR2qM++ThxwVc2ze77OMoUC5 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2014:06:03 10:18:13+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 116224 |
| InitializedDataSize: | 385024 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xe05c |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 3.1.12.5 |
| ProductVersionNumber: | 3.1.15.0 |
| FileFlagsMask: | 0x0017 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | App.install |
| FileDescription: | setup.manager |
| FileVersion: | 3.1.12.5 |
| InternalName: | app.install.exe |
| LegalCopyright: | copyright © 2014 |
| ProductVersion: | 3.1.15 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1184 | "C:\Users\admin\AppData\Local\Temp\n108\2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe" ins.exe /e 11775393 /u 50d1d9d5-cf90-407c-820a-35e05bc06f2f /v "C:\Users\admin\Desktop\2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe" | C:\Users\admin\AppData\Local\Temp\n108\2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | — | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | |||||||||||
User: admin Company: Setup Aplications Integrity Level: MEDIUM Description: Setup Aplications Exit code: 3221226540 Version: 3.1.17 Modules
| |||||||||||||||
| 2108 | "C:\Users\admin\Desktop\2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe" | C:\Users\admin\Desktop\2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | explorer.exe | ||||||||||||
User: admin Company: App.install Integrity Level: MEDIUM Description: setup.manager Exit code: 0 Version: 3.1.12.5 Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6488 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6560 | "C:\Users\admin\AppData\Local\Temp\n108\2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe" ins.exe /e 11775393 /u 50d1d9d5-cf90-407c-820a-35e05bc06f2f /v "C:\Users\admin\Desktop\2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe" | C:\Users\admin\AppData\Local\Temp\n108\2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | ||||||||||||
User: admin Company: Setup Aplications Integrity Level: HIGH Description: Setup Aplications Exit code: 23 Version: 3.1.17 Modules
| |||||||||||||||
| (PID) Process: | (6560) 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates |
| Operation: | delete value | Name: | 91C6D6EE3E8AC86384E548C299295C756C817B81 |
Value: | |||
| (PID) Process: | (6560) 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81 |
| Operation: | write | Name: | Blob |
Value: 0400000001000000100000008CCADC0B22CEF5BE72AC411A11A8D8120B000000010000000E00000074006800610077007400650000001400000001000000140000007B5B45CFAFCECB7AFD31921A6AB6F346EB57485053000000010000002500000030233021060B6086480186F8450107300130123010060A2B0601040182373C0101030200C07F000000010000002A000000302806082B0601050507030206082B0601050507030306082B0601050507030406082B060105050703010F000000010000001400000085FEF11B4F47FE3952F98301C9F98976FEFEE0CE03000000010000001400000091C6D6EE3E8AC86384E548C299295C756C817B81190000000100000010000000DC73F9B71E16D51D26527D32B11A6A3D09000000010000002A000000302806082B0601050507030206082B0601050507030306082B0601050507030406082B060105050703016200000001000000200000008D722F81A9C113C0791DF136A2966DB26C950A971DB46B4199F4EA54B78BFB9F1D00000001000000100000005B3B67000EEB80022E42605B6B3B72407E000000010000000800000000C0032F2DF8D6012000000001000000240400003082042030820308A0030201020210344ED55720D5EDEC49F42FCE37DB2B6D300D06092A864886F70D01010505003081A9310B300906035504061302555331153013060355040A130C7468617774652C20496E632E31283026060355040B131F43657274696669636174696F6E205365727669636573204469766973696F6E31383036060355040B132F2863292032303036207468617774652C20496E632E202D20466F7220617574686F72697A656420757365206F6E6C79311F301D06035504031316746861777465205072696D61727920526F6F74204341301E170D3036313131373030303030305A170D3336303731363233353935395A3081A9310B300906035504061302555331153013060355040A130C7468617774652C20496E632E31283026060355040B131F43657274696669636174696F6E205365727669636573204469766973696F6E31383036060355040B132F2863292032303036207468617774652C20496E632E202D20466F7220617574686F72697A656420757365206F6E6C79311F301D06035504031316746861777465205072696D61727920526F6F7420434130820122300D06092A864886F70D01010105000382010F003082010A0282010100ACA0F0FB8059D49CC7A4CF9DA159730910450C0D2C6E68F16C5B4868495937FC0B3319C2777FCC102D95341CE6EB4D09A71CD2B8C9973602B789D4245F06C0CC4494948D02626FEB5ADD118D289A5C8490107A0DBD74662F6A38A0E2D55444EB1D079F07BA6FEEE9FD4E0B29F53E84A001F19CABF81C7E89A4E8A1D871650DA3517BEEBCD222600DB95B9DDFBAFC515B0BAF98B2E92EE904E86287DE2BC8D74EC14C641EDDCF8758BA4A4FCA68071D1C9D4AC6D52F91CC7C71721CC5C067EB32FDC9925C94DA85C09BBF537D2B09F48C9D911F976A52CBDE0936A477D87B875044D53E6E2969FB3949261E09A5807B402DEBE82785C9FE61FD7EE67C971DD59D0203010001A3423040300F0603551D130101FF040530030101FF300E0603551D0F0101FF040403020106301D0603551D0E041604147B5B45CFAFCECB7AFD31921A6AB6F346EB574850300D06092A864886F70D010105050003820101007911C04BB391B6FCF0E967D40D6E45BE55E893D2CE033FEDDA25B01D57CB1E3A76A04CEC5076E864720CA4A9F1B88BD6D68784BB32E54111C077D9B3609DEB1BD5D16E4444A9A601EC55621D77B85C8E48497C9C3B5711ACAD73378E2F785C906847D96060E6FC073D222017C4F716E9C4D872F9C8737CDF162F15A93EFD6A27B6A1EB5ABA981FD5E34D640A9D13C861BAF5391C87BAB8BD7B227FF6FEAC4079E5AC106F3D8F1B79768BC437B3211884E53600EB632099B9E9FE3304BB41C8C102F94463209E81CE42D3D63F2C76D3639C59DD8FA6E10EA02E41F72E9547CFBCFD33F3F60B617E7E912B8147C22730EEA7105D378F5C392BE404F07B8D568C68 | |||
| (PID) Process: | (6560) 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81 |
| Operation: | write | Name: | Blob |
Value: 5C0000000100000004000000000800007E000000010000000800000000C0032F2DF8D6011D00000001000000100000005B3B67000EEB80022E42605B6B3B72406200000001000000200000008D722F81A9C113C0791DF136A2966DB26C950A971DB46B4199F4EA54B78BFB9F09000000010000002A000000302806082B0601050507030206082B0601050507030306082B0601050507030406082B06010505070301190000000100000010000000DC73F9B71E16D51D26527D32B11A6A3D03000000010000001400000091C6D6EE3E8AC86384E548C299295C756C817B810F000000010000001400000085FEF11B4F47FE3952F98301C9F98976FEFEE0CE7F000000010000002A000000302806082B0601050507030206082B0601050507030306082B0601050507030406082B0601050507030153000000010000002500000030233021060B6086480186F8450107300130123010060A2B0601040182373C0101030200C01400000001000000140000007B5B45CFAFCECB7AFD31921A6AB6F346EB5748500B000000010000000E00000074006800610077007400650000000400000001000000100000008CCADC0B22CEF5BE72AC411A11A8D8122000000001000000240400003082042030820308A0030201020210344ED55720D5EDEC49F42FCE37DB2B6D300D06092A864886F70D01010505003081A9310B300906035504061302555331153013060355040A130C7468617774652C20496E632E31283026060355040B131F43657274696669636174696F6E205365727669636573204469766973696F6E31383036060355040B132F2863292032303036207468617774652C20496E632E202D20466F7220617574686F72697A656420757365206F6E6C79311F301D06035504031316746861777465205072696D61727920526F6F74204341301E170D3036313131373030303030305A170D3336303731363233353935395A3081A9310B300906035504061302555331153013060355040A130C7468617774652C20496E632E31283026060355040B131F43657274696669636174696F6E205365727669636573204469766973696F6E31383036060355040B132F2863292032303036207468617774652C20496E632E202D20466F7220617574686F72697A656420757365206F6E6C79311F301D06035504031316746861777465205072696D61727920526F6F7420434130820122300D06092A864886F70D01010105000382010F003082010A0282010100ACA0F0FB8059D49CC7A4CF9DA159730910450C0D2C6E68F16C5B4868495937FC0B3319C2777FCC102D95341CE6EB4D09A71CD2B8C9973602B789D4245F06C0CC4494948D02626FEB5ADD118D289A5C8490107A0DBD74662F6A38A0E2D55444EB1D079F07BA6FEEE9FD4E0B29F53E84A001F19CABF81C7E89A4E8A1D871650DA3517BEEBCD222600DB95B9DDFBAFC515B0BAF98B2E92EE904E86287DE2BC8D74EC14C641EDDCF8758BA4A4FCA68071D1C9D4AC6D52F91CC7C71721CC5C067EB32FDC9925C94DA85C09BBF537D2B09F48C9D911F976A52CBDE0936A477D87B875044D53E6E2969FB3949261E09A5807B402DEBE82785C9FE61FD7EE67C971DD59D0203010001A3423040300F0603551D130101FF040530030101FF300E0603551D0F0101FF040403020106301D0603551D0E041604147B5B45CFAFCECB7AFD31921A6AB6F346EB574850300D06092A864886F70D010105050003820101007911C04BB391B6FCF0E967D40D6E45BE55E893D2CE033FEDDA25B01D57CB1E3A76A04CEC5076E864720CA4A9F1B88BD6D68784BB32E54111C077D9B3609DEB1BD5D16E4444A9A601EC55621D77B85C8E48497C9C3B5711ACAD73378E2F785C906847D96060E6FC073D222017C4F716E9C4D872F9C8737CDF162F15A93EFD6A27B6A1EB5ABA981FD5E34D640A9D13C861BAF5391C87BAB8BD7B227FF6FEAC4079E5AC106F3D8F1B79768BC437B3211884E53600EB632099B9E9FE3304BB41C8C102F94463209E81CE42D3D63F2C76D3639C59DD8FA6E10EA02E41F72E9547CFBCFD33F3F60B617E7E912B8147C22730EEA7105D378F5C392BE404F07B8D568C68 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B | binary | |
MD5:F37492C8345562CCEAF4BD1B7775B58E | SHA256:8B725E82BBBCCE14EDA6262EE53DC6DD78CB95AEF066DE49D8AB608DF684DB9F | |||
| 6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12236C41CDDF9E40BA5606CDF086B821 | binary | |
MD5:716DCA7910C90788C77271A8F9EBC74D | SHA256:F2731CDC655C305A036430ABA014F490F32B8D6E26C4F563C1E253B8A083AB6C | |||
| 6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9 | binary | |
MD5:5BFA51F3A417B98E7443ECA90FC94703 | SHA256:BEBE2853A3485D1C2E5C5BE4249183E0DDAFF9F87DE71652371700A89D937128 | |||
| 6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9 | binary | |
MD5:C011C9D50C06EA2C9773DD198233BEEC | SHA256:BB47CCCE92BA6D72A1682AD89741992EFB5336501FBDFEED35088D651A72D422 | |||
| 6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30 | binary | |
MD5:5BFA51F3A417B98E7443ECA90FC94703 | SHA256:BEBE2853A3485D1C2E5C5BE4249183E0DDAFF9F87DE71652371700A89D937128 | |||
| 6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30 | binary | |
MD5:7F615BC1CAC2D34A5EBE041FDE113F61 | SHA256:AB98784A1C399B78BD10C82C120017E64405D2D7053080FDDC60CEB6D3D416D7 | |||
| 2108 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | C:\Users\admin\AppData\Local\Temp\n108\2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | executable | |
MD5:C268C937148A046322219B77C5A031B0 | SHA256:C913057E15AC6B27B204BE58B52132D62901746075FAA298BB0D08C84958D51E | |||
| 6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\12236C41CDDF9E40BA5606CDF086B821 | binary | |
MD5:189FDA5C1057E175AEA0E63B84135E94 | SHA256:23F94CF4CE13F77B965C95EFF307BAA619C5C5A432633C57D70F0064C6AEE7C9 | |||
| 6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B | binary | |
MD5:C325A1ABE006DE66FF958DAB61A464DC | SHA256:E6D590AA729C9CAA178A039345C80DC7083CDE53F3CD3199E8C00723870DEDC7 | |||
| 6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | C:\Windows\assembly\Desktop.ini | binary | |
MD5:F7F759A5CD40BC52172E83486B6DE404 | SHA256:A709C2551B8818D7849D31A65446DC2F8C4CCA2DCBBC5385604286F49CFDAF1C | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | GET | 200 | 2.23.79.3:80 | http://ocsp.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQwF4prw9S7mCbCEHD%2Fyl6nWPkczAQUe1tFz6%2FOy3r9MZIaarbzRutXSFACEEeXTXhzpbyrDS%2BzcBkvzl4%3D | unknown | — | — | whitelisted |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | GET | 200 | 2.23.79.3:80 | http://ocsp.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQwF4prw9S7mCbCEHD%2Fyl6nWPkczAQUe1tFz6%2FOy3r9MZIaarbzRutXSFACEEeXTXhzpbyrDS%2BzcBkvzl4%3D | unknown | — | — | whitelisted |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | GET | 200 | 2.23.79.3:80 | http://crl.thawte.com/ThawtePCA.crl | unknown | — | — | whitelisted |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | GET | 200 | 2.23.79.3:80 | http://ocsp.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRsif7263KedmR2MLuYKv9%2BWQCtWAQU1A1lP3q9NMb%2BR%2BdMDcC98t4Vq3ECEDI%2FRNZq74kPQ8Ms%2FXQ6StA%3D | unknown | — | — | whitelisted |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | GET | 200 | 2.23.79.3:80 | http://ocsp.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRsif7263KedmR2MLuYKv9%2BWQCtWAQU1A1lP3q9NMb%2BR%2BdMDcC98t4Vq3ECEDI%2FRNZq74kPQ8Ms%2FXQ6StA%3D | unknown | — | — | whitelisted |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | GET | 200 | 184.30.131.114:80 | http://cs-g2-crl.thawte.com/ThawteCSG2.crl | unknown | — | — | whitelisted |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | GET | 200 | 76.223.26.96:80 | http://api.socdn.com/installer/50d1d9d5-cf90-407c-820a-35e05bc06f2f/11775393/config | unknown | — | — | malicious |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | POST | 200 | 76.223.26.96:80 | http://api.socdn.com/installer/50d1d9d5-cf90-407c-820a-35e05bc06f2f/11775393/event | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 2.16.164.120:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
2104 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | 2.23.79.3:80 | ocsp.thawte.com | AKAMAI-AS | DE | whitelisted |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | 184.30.131.114:80 | cs-g2-crl.thawte.com | AKAMAI-AS | US | whitelisted |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | 76.223.26.96:80 | api.socdn.com | AMAZON-02 | US | malicious |
5308 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
ocsp.thawte.com |
| whitelisted |
crl.thawte.com |
| whitelisted |
cs-g2-crl.thawte.com |
| whitelisted |
api.socdn.com |
| malicious |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | Possibly Unwanted Program Detected | ADWARE [ANY.RUN] Solimba installer |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (DownloadMR) |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | Generic Protocol Command Decode | SURICATA HTTP status 100-Continue already seen |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | Possibly Unwanted Program Detected | ADWARE [ANY.RUN] Solimba installer |
6560 | 2025-05-18_00ee209d747977b8c5cd3f7f47d6038c_elex_mafia_rhadamanthys_stealc_tofsee.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (DownloadMR) |