File MD5Sum | SHA1SUM | SHA256SUM | FUZZY HASH | File Size |
---|---|---|---|---|
c0fc59d786818c6e0bc05cd21509a7e3 | 3d5973bbca246c9bc0b3de1ab50c25fd916cf96f | db8d97891278b2a54f9fdfbe5b53dca619c33b25c8878637db107a8d75dbd6a7 | 6144:iZrvzkU9DbYzz+cZBKptZYSotSSMgARJXOeONif1Q427F6kw18aXG13GLotvVy+M:gvzkUZ4YTU | 494080 |
File Name |
---|
teamslob.jpg.exe |
Snort Class | Snort Alert | Count |
---|---|---|
N/A | No snort alerts generated | 0 |
AV Alert | AV Vendor |
---|---|
N/A | Symantec |
PWS-Banker!gqf | McAfee |
Trojan-Downloader.Win32.Banload.bizw | Kaspersky |
Path | Folder Name |
---|
Path | File Name |
---|---|
c:/WINDOWS/Prefetch | SANDNET.EXE-2012C478.pf |
c: | borogvegas.txt |
c: | netstat_post.txt |
c: | tasksvc_post.txt |
c: | taskv_post.txt |
Action | Path | File Name |
---|
Action | Path |
---|
Action | Path | Val_Name | Val_Data |
---|
Action | Path | Val_Name | Val_Type | Mod_Val_Type | Val_Data | Mod_Val_Data |
---|
Action | Path | Val_Name | Val_Data | Mod_Val_Data |
---|---|---|---|---|
modified | HKLM/SOFTWARE/Microsoft/Cryptography/RNG | Seed | B7 21 1C B8 4E A0 B2 B1 63 55 A1 37 CF 77 0F F3 14 79 EE 3B 39 0F 78 E7 6B 7A C1 | 8C 3E 9A 94 37 C0 63 A2 02 EF 09 87 A6 F7 B2 A8 2A 31 D8 CC 94 02 E0 C0 5F D0 E |
modified | HKU/S-1-5-21-1844237615-562591055-839522115-1004/SessionInformation | ProgramCount | 0x00000002 | 0x00000001 |
DNS | DNS Response |
---|
DstIP | HTTP_HOST | HTTP_REQUEST_URI | HTTP_USER_AGENT | PROTOCOL |
---|
PROTOCOL | SRC_PKTS | DST_PKTS | SRC_BYTES | DST_BYTES |
---|
DPORT | PROTOCOL | SRC_PKTS | DST_PKTS | SRC_BYTES | DST_BYTES |
---|
Time | Date | Protocol | SrcIP | DstIP | Dir | Flags | Sport | Dport | Pkts | Bytes |
---|
Packer Name |
---|
Honey Trap Log File Location |
---|
PTFB Log File Location |
---|