Try VMRay Platform
Malicious
Classifications

Downloader Injector Backdoor

Threat Names

Warzone SmokeLoader Mal/Generic-S RedNet +3

Dynamic Analysis Report

Created on 2023-05-05T15:57:14+00:00

558944fc2adfcd051a2f55cf18141d0b6e70282d51bb425e4035c09d39aac49a.exe

Windows Exe (x86-32)

Remarks (2/3)

(0x02000008): One or more processes crashed during the analysis. Analysis results may be incomplete.

(0x0200000E): The overall sleep time of all monitored processes was truncated from "7 minutes, 17 seconds" to "20 seconds" to reveal dormant functionality.

General

177.86 KB total sent, 17.43 MB total received
4 ports: 80, 443, 53, 445
15 contacted IP addresses
18 URLs extracted
14 files downloaded
0 malicious hosts detected

DNS

467 Bytes sent, 1.02 KB received
7 queries for 7 domains
1 name server contacted
0 queries returned errors

HTTP/S

166.59 KB sent, 18.33 MB received
17 URLs, 13 contacted servers
15 sessions detected
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image