34e6ca7f...2f7e | Network
Try VMRay Analyzer
VTI SCORE: 94/100
Dynamic Analysis Report
Classification: Keylogger, Spyware, Downloader

34e6ca7fcd9b02405980bd6a92e20b8f972b0988e90576135c4ce12216f12f7e (SHA256)

Attacker.exe

Windows Exe (x86-32)

Created at 2018-10-25 06:43:00

Notifications (2/3)

The maximum number of reputation file hash requests (20 per analysis) was exceeded. As a result, the reputation status could not be queried for all file hashes. In order to get the reputation status for all file hashes, please increase the 'Max File Hash Requests' setting in the system configurations.

The operating system was rebooted during the analysis.

Network Overview

Hosts (1)
»
Hostname IP Address Location Protocols Reputation Status WHOIS Data
purbs.com 47.254.153.36 Frankfurt Am Main (Germany) HTTPS, TCP
Not Queried
Not Queried
URLs (2)
»
URL Categories Names Source HTTP Status Code Reputation Status
HTTP://purbs.com/images/0RcBpczPE/RnhzOHSVr1TpkbdctKZT/tTrk4jpxXKbv4CH_2FI/eIKRtAHsz9aO225_2Fj6qM/0l2NhR4hPnXQU/C4DFMHnY/jvQJc5X0nMDMkjvqSXmHQya/KjFeI9lcAI/Ga_2Bm0j4eSP3wN17/ZET_2B0KJsbG/8ojG32FFsWP/OSJ2lf7AtmHU2V/YE32C2I3o/A0lbECMv/wP58m.gif - - Function Log -
Unknown
HTTP://purbs.com/images/1Q3QMp_2FQ9TaHUd55/2fUhLiOJz/UZpd10_2F4v11yd6tdEO/MohIps62L2eIP1oRxg5/no0UUUC1aLYuV6OL9h7PIj/LPrgPDCAp9Zn9/n6_2FgkT/sLE4yJyGujc1o7gvbb6R6Zu/On3_2BTEFj/Y5QMrTbqya4730lFX/p6nGWi7rnU2D/tQdxI_2FwJd/eLntUhSEHNXLXk/RBBBMhlmkhAuDQ7oluvfk/UoN_2FsN/9.bmp - - Function Log -
Unknown

Connections

DNS (1)
»
Operation Additional Information Success Count Logfile
Get Hostname name_out = LHnIwsj True 1
Fn
UDP Sessions (2)
»
Total Data Sent 0.08 KB
Total Data Received 0.10 KB
Contacted Host Count 1
Contacted Hosts 192.168.0.1:53
UDP Session #1
»
Information Value
Source Function Log
Handle 0x148
Address Family AF_INET
Type SOCK_DGRAM
Protocol IPPROTO_IP
Local Address 0.0.0.0
Local Port 59246
Data Sent 0.04 KB
Data Received 0.04 KB
Operation Additional Information Success Count Logfile
Create protocol = IPPROTO_IP, address_family = AF_INET, type = SOCK_DGRAM True 1
Fn
Connect remote_address = 192.168.0.1, remote_port = 53 True 1
Fn
Send flags = NO_FLAG_SET, size = 42, size_out = 42 True 1
Fn
Data
Receive flags = NO_FLAG_SET, size = 65536, size_out = 42 True 1
Fn
Data
Close type = SOCK_DGRAM True 1
Fn
UDP Session #2
»
Information Value
Source Function Log
Handle 0x148
Address Family AF_INET
Type SOCK_DGRAM
Protocol IPPROTO_IP
Local Address 0.0.0.0
Local Port 59246
Data Sent 0.04 KB
Data Received 0.06 KB
Operation Additional Information Success Count Logfile
Create protocol = IPPROTO_IP, address_family = AF_INET, type = SOCK_DGRAM True 1
Fn
Connect remote_address = 192.168.0.1, remote_port = 53 True 1
Fn
Send flags = NO_FLAG_SET, size = 40, size_out = 40 True 1
Fn
Data
Receive flags = NO_FLAG_SET, size = 65536, size_out = 63 True 1
Fn
Data
Close type = SOCK_DGRAM True 1
Fn
HTTP Sessions (2)
»
Information Value
Total Data Sent 0.89 KB
Total Data Received 0.01 KB
Contacted Host Count 1
Contacted Hosts purbs.com
HTTP Session #1
»
Information Value
Source Function Log
User Agent Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0; Win64; x64)
Server Name purbs.com
Server Port 443
Data Sent 0.43 KB
Data Received 0.00 KB
Operation Additional Information Success Count Logfile
Open Session user_agent = Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0; Win64; x64), access_type = INTERNET_OPEN_TYPE_PRECONFIG, flags = INTERNET_FLAG_ASYNC True 1
Fn
Open Connection protocol = HTTP, server_name = purbs.com, server_port = 443 True 1
Fn
Open HTTP Request http_verb = GET, http_version = HTTP/1.1, target_resource = /images/0RcBpczPE/RnhzOHSVr1TpkbdctKZT/tTrk4jpxXKbv4CH_2FI/eIKRtAHsz9aO225_2Fj6qM/0l2NhR4hPnXQU/C4DFMHnY/jvQJc5X0nMDMkjvqSXmHQya/KjFeI9lcAI/Ga_2Bm0j4eSP3wN17/ZET_2B0KJsbG/8ojG32FFsWP/OSJ2lf7AtmHU2V/YE32C2I3o/A0lbECMv/wP58m.gif, accept_types = 0, flags = INTERNET_FLAG_CACHE_ASYNC, INTERNET_FLAG_PRAGMA_NOCACHE, INTERNET_FLAG_IGNORE_CERT_CN_INVALID, INTERNET_FLAG_IGNORE_CERT_DATE_INVALID, INTERNET_FLAG_KEEP_CONNECTION, INTERNET_FLAG_SECURE, INTERNET_FLAG_NO_CACHE_WRITE, INTERNET_FLAG_RELOAD True 1
Fn
Send HTTP Request headers = WINHTTP_NO_ADDITIONAL_HEADERS, url = purbs.com/images/0RcBpczPE/RnhzOHSVr1TpkbdctKZT/tTrk4jpxXKbv4CH_2FI/eIKRtAHsz9aO225_2Fj6qM/0l2NhR4hPnXQU/C4DFMHnY/jvQJc5X0nMDMkjvqSXmHQya/KjFeI9lcAI/Ga_2Bm0j4eSP3wN17/ZET_2B0KJsbG/8ojG32FFsWP/OSJ2lf7AtmHU2V/YE32C2I3o/A0lbECMv/wP58m.gif False 1
Fn
Read Response size = 4096, 0 True 1
Fn
Query HTTP Info flags = HTTP_QUERY_FLAG_NUMBER, HTTP_QUERY_STATUS_CODE, size_out = 4 True 1
Fn
Data
Close Session - True 2
Fn
HTTP Session #2
»
Information Value
Source Function Log
User Agent Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0; Win64; x64)
Server Name purbs.com
Server Port 443
Data Sent 0.46 KB
Data Received 0.00 KB
Operation Additional Information Success Count Logfile
Open Session user_agent = Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0; Win64; x64), access_type = INTERNET_OPEN_TYPE_PRECONFIG, flags = INTERNET_FLAG_ASYNC True 1
Fn
Open Connection protocol = HTTP, server_name = purbs.com, server_port = 443 True 1
Fn
Open HTTP Request http_verb = POST, http_version = HTTP/1.1, target_resource = /images/1Q3QMp_2FQ9TaHUd55/2fUhLiOJz/UZpd10_2F4v11yd6tdEO/MohIps62L2eIP1oRxg5/no0UUUC1aLYuV6OL9h7PIj/LPrgPDCAp9Zn9/n6_2FgkT/sLE4yJyGujc1o7gvbb6R6Zu/On3_2BTEFj/Y5QMrTbqya4730lFX/p6nGWi7rnU2D/tQdxI_2FwJd/eLntUhSEHNXLXk/RBBBMhlmkhAuDQ7oluvfk/UoN_2FsN/9.bmp, accept_types = 0, flags = INTERNET_FLAG_CACHE_ASYNC, INTERNET_FLAG_PRAGMA_NOCACHE, INTERNET_FLAG_IGNORE_CERT_CN_INVALID, INTERNET_FLAG_IGNORE_CERT_DATE_INVALID, INTERNET_FLAG_KEEP_CONNECTION, INTERNET_FLAG_SECURE, INTERNET_FLAG_NO_CACHE_WRITE, INTERNET_FLAG_RELOAD True 1
Fn
Add HTTP Request Headers headers = Content-Type: multipart/form-data; boundary=--------------------------1146d711146d711146d71 True 1
Fn
Send HTTP Request headers = WINHTTP_NO_ADDITIONAL_HEADERS, url = purbs.com/images/1Q3QMp_2FQ9TaHUd55/2fUhLiOJz/UZpd10_2F4v11yd6tdEO/MohIps62L2eIP1oRxg5/no0UUUC1aLYuV6OL9h7PIj/LPrgPDCAp9Zn9/n6_2FgkT/sLE4yJyGujc1o7gvbb6R6Zu/On3_2BTEFj/Y5QMrTbqya4730lFX/p6nGWi7rnU2D/tQdxI_2FwJd/eLntUhSEHNXLXk/RBBBMhlmkhAuDQ7oluvfk/UoN_2FsN/9.bmp False 1
Fn
Query HTTP Info flags = HTTP_QUERY_FLAG_NUMBER, HTTP_QUERY_STATUS_CODE, size_out = 4 True 1
Fn
Data
Close Session - True 2
Fn
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image