Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Nov. 1, 2021, 11:32 a.m. | Nov. 1, 2021, 11:36 a.m. |
-
-
-
dipster.exe dipster.exe
3024
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
thisonecantbebanned.top | 78.155.222.151 | |
iplogger.org | 88.99.66.31 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49170 88.99.66.31:443 |
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA | CN=*.iplogger.org | 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb |
pdb_path | C:\xuvuyirahavuzo-kes_gupapawiwege.pdb |
section | .giki |
request | GET http://thisonecantbebanned.top/jollion/lipster.exe |
request | GET http://thisonecantbebanned.top/moons/top.exe |
request | GET https://iplogger.org/16twf7 |
request | GET https://iplogger.org/1ggL27 |
domain | thisonecantbebanned.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Roaming\neverlose\ipstersh.exe |
file | C:\Users\test22\AppData\Roaming\neverlose\dipster.exe |
file | C:\Users\test22\AppData\Roaming\neverlose\ipstersh.exe |
file | C:\Users\test22\AppData\Roaming\neverlose\dipster.exe |
section | {u'size_of_data': u'0x0007b400', u'virtual_address': u'0x00001000', u'entropy': 7.956033038443628, u'name': u'.text', u'virtual_size': u'0x0007b233'} | entropy | 7.95603303844 | description | A section with a high entropy has been found | |||||||||
entropy | 0.854419410745 | description | Overall entropy of this PE file is high |
url | http://thisonecantbebanned.top/jollion/lipster.exe |
url | https://iplogger.org/16twf7 |
url | https://iplogger.org/1ggL27 |
url | http://thisonecantbebanned.top/moons/top.exe |
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook |
host | 195.2.93.45 |
file | C:\ProgramData\AVAST Software |
file | C:\ProgramData\Avira |
file | C:\ProgramData\Kaspersky Lab |
file | C:\ProgramData\Panda Security |
file | C:\ProgramData\McAfee |
file | C:\ProgramData\Avg |
file | C:\ProgramData\Doctor Web |
file | C:\ProgramData\Malwarebytes |
registry | HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString |