Automated Malware Analysis Report for https ...

51
ID: 76620 Cookbook: browseurl.jbs Time: 03:11:27 Date: 12/09/2018 Version: 23.0.0

Transcript of Automated Malware Analysis Report for https ...

Page 1: Automated Malware Analysis Report for https ...

ID: 76620Cookbook: browseurl.jbsTime: 03:11:27Date: 12/09/2018Version: 23.0.0

Page 2: Automated Malware Analysis Report for https ...

24444455666667

7

77

777888

888888

88889

999

1919192021

2121

21212223242526

Table of Contents

Table of ContentsAnalysis Report https://classskincare.com/%3c

OverviewGeneral InformationDetectionConfidenceClassificationAnalysis AdviceSignature Overview

AV Detection:Phishing:Networking:System Summary:Hooking and other Techniques for Hiding and Protection:

Behavior Graph

SimulationsBehavior and APIs

Antivirus DetectionInitial SampleDropped FilesUnpacked PE FilesDomainsURLs

Yara OverviewInitial SamplePCAP (Network Traffic)Dropped FilesMemory DumpsUnpacked PEs

Joe Sandbox View / ContextIPsDomainsASNDropped Files

ScreenshotsStartupCreated / dropped FilesDomains and IPs

Contacted DomainsURLs from Memory and BinariesContacted IPsPublic

Static File InfoNo static file info

Network BehaviorNetwork Port DistributionTCP PacketsUDP PacketsDNS QueriesDNS AnswersHTTPS Packets

Copyright Joe Security LLC 2018 Page 2 of 51

Page 3: Automated Malware Analysis Report for https ...

494949

4949494949

50505050

505050

51

Code ManipulationsStatistics

Behavior

System BehaviorAnalysis Process: iexplore.exe PID: 3232 Parent PID: 548

GeneralFile ActivitiesRegistry Activities

Analysis Process: iexplore.exe PID: 3284 Parent PID: 3232GeneralFile ActivitiesRegistry Activities

Analysis Process: ssvagent.exe PID: 3356 Parent PID: 3284GeneralRegistry Activities

Disassembly

Copyright Joe Security LLC 2018 Page 3 of 51

Page 4: Automated Malware Analysis Report for https ...

Analysis Report https://classskincare.com/%3c

Overview

General Information

Joe Sandbox Version: 23.0.0

Analysis ID: 76620

Start date: 12.09.2018

Start time: 03:11:27

Joe Sandbox Product: CloudBasic

Overall analysis duration: 0h 3m 56s

Hypervisor based Inspection enabled: false

Report type: light

Cookbook file name: browseurl.jbs

Sample URL: https://classskincare.com/%3c

Analysis system description: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Flash 26, Java 8.0.1440.1)

Number of analysed new started processes analysed: 5

Number of new started drivers analysed: 0

Number of existing processes analysed: 0

Number of existing drivers analysed: 0

Number of injected processes analysed: 0

Technologies EGA enabled

Analysis stop reason: Timeout

Detection: MAL

Classification: mal52.phis.win@5/45@9/8

Cookbook Comments: Adjust boot timeBrowsing link: https://signup.live.com/

Warnings:

Detection

Strategy Score Range Reporting Detection

Threshold 52 0 - 100 Report FP / FN

Confidence

Strategy Score Range Further Analysis Required? Confidence

Exclude process from analysis (whitelisted): dllhost.exeTCP Packets have been reduced to 100Report size getting too big, too many NtDeviceIoControlFile calls found.Report size getting too big, too many NtProtectVirtualMemory calls found.

Show All

Copyright Joe Security LLC 2018 Page 4 of 51

Page 5: Automated Malware Analysis Report for https ...

Threshold 5 0 - 5 false

Strategy Score Range Further Analysis Required? Confidence

Analysis Advice

Sample has a GUI, but Joe Sandbox has not found any clickable buttons, likely more UI automation may extend behavior

Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis

Ransomware

Spreading

Phishing

Banker

Trojan / Bot

Adware

Spyware

Exploiter

Evader

Miner

clean

clean

clean

clean

clean

clean

clean

suspicious

suspicious

suspicious

suspicious

suspicious

suspicious

suspicious

malicious

malicious

malicious

malicious

malicious

malicious

malicious

Classification

Copyright Joe Security LLC 2018 Page 5 of 51

Page 6: Automated Malware Analysis Report for https ...

Signature Overview

• AV Detection

• Phishing

• Networking

• System Summary

• Hooking and other Techniques for Hiding and Protection

Click to jump to signature section

AV Detection:

Antivirus detection for URL or domain

Phishing:

Phishing site detected (based on logo template match)

HTML body contains low number of good links

HTML title does not match URL

Submit button contains javascript call

META author tag missing

META copyright tag missing

Networking:

Downloads files

Found strings which match to known social media urls

Performs DNS lookups

Urls found in memory or binary data

Uses HTTPS

System Summary:

Searches the installation path of Mozilla Firefox

Classification label

Creates files inside the user directory

Creates temporary files

Reads ini files

Reads software policies

Spawns processes

Uses an in-process (OLE) Automation server

Found graphical window changes (likely an installer)

Uses new MSVCR Dlls

Copyright Joe Security LLC 2018 Page 6 of 51

Page 7: Automated Malware Analysis Report for https ...

Hooking and other Techniques for Hiding and Protection:

Disables application error messsages (SetErrorMode)

Behavior Graph

ID: 76620

URL: https://classskincare.com/%3c

Startdate: 12/09/2018

Architecture: WINDOWS

Score: 52

firozenterprise.com

Antivirus detectionfor URL or domain

Phishing site detected(based on logo template

match)

iexplore.exe

25 49

started

iexplore.exe

2 50

started

classskincare.com

103.8.27.160, 443, 49161, 49162

SKSATECH1-MYSKSATECHNOLOGYSDNBHDMY

Malaysia

firozenterprise.com

104.219.251.196, 443, 49165, 49166

NAMECHEAP-NET-NamecheapIncUS

United States

15 other IPs or domains

ssvagent.exe

6

started

Legend:

Process

Signature

Created File

DNS/IP Info

Is Dropped

Is Windows Process

Number of created Registry Values

Number of created Files

Visual Basic

Delphi

Java

.Net C# or VB.NET

C, C++ or other language

Is malicious

Hide Legend

Time Type Description

03:11:46 API Interceptor 89x Sleep call for process: iexplore.exe modified

03:11:46 API Interceptor 1x Sleep call for process: ssvagent.exe modified

Source Detection Scanner Label Link

https://classskincare.com/%3c 3% virustotal Browse

No Antivirus matches

Behavior Graph

Simulations

Behavior and APIs

Antivirus Detection

Initial Sample

Dropped Files

Copyright Joe Security LLC 2018 Page 7 of 51

Page 8: Automated Malware Analysis Report for https ...

No Antivirus matches

Source Detection Scanner Label Link

wut-scu-prod.cloudapp.net 0% virustotal Browse

classskincare.com 1% virustotal Browse

firozenterprise.com 0% virustotal Browse

wut-eu-prod.cloudapp.net 0% virustotal Browse

Source Detection Scanner Label Link

https://classskincare.com/%3c/ 100% Avira URL Cloud phishing

https://firozenterprise.com/memo/toda/n 0% Avira URL Cloud safe

https://signup.live.co 0% Avira URL Cloud safe

https://firozenterprise.com/memo/toda/Root 0% Avira URL Cloud safe

https://signup.live.coe.com/memo/toda/n 0% Avira URL Cloud safe

https://firozenterprise.com/memo/toda/BSign 0% Avira URL Cloud safe

https://getbootstrap.com) 0% Avira URL Cloud safe

https://firozenterprise.com/memo/toda/ 0% virustotal Browse

https://firozenterprise.com/memo/toda/ 0% Avira URL Cloud safe

No yara matches

No yara matches

No yara matches

No yara matches

No yara matches

No context

No context

Unpacked PE Files

Domains

URLs

Yara Overview

Initial Sample

PCAP (Network Traffic)

Dropped Files

Memory Dumps

Unpacked PEs

Joe Sandbox View / Context

IPs

Domains

ASN

Copyright Joe Security LLC 2018 Page 8 of 51

Page 9: Automated Malware Analysis Report for https ...

No context

No context

System is w7

iexplore.exe (PID: 3232 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: CA1F703CD665867E8132D2946FB55750)iexplore.exe (PID: 3284 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' SCODEF:3232 CREDAT:275457 /prefetch:2 MD5:

CA1F703CD665867E8132D2946FB55750)ssvagent.exe (PID: 3356 cmdline: 'C:\PROGRA~1\Java\JRE18~1.0_1\bin\ssvagent.exe' -new MD5: 0953A0264879FD1E655B75B63B9083B7)

cleanup

C:\Users\HERBBL~1\AppData\Local\Temp\CabA333.tmp

Process: C:\Program Files\Internet Explorer\iexplore.exe

Dropped Files

Screenshots

Startup

Created / dropped Files

Copyright Joe Security LLC 2018 Page 9 of 51

Page 10: Automated Malware Analysis Report for https ...

File Type: Microsoft Cabinet archive data, 55153 bytes, 1 file

Size (bytes): 55153

Entropy (8bit): 7.995722006815289

Encrypted: true

MD5: C80707FEAA56B9F5F9F299A70A89A675

SHA1: 2DD4AA8EB8E0AD265AFA6FDEF00FCC1625CA959C

SHA-256: 8573C2B9348FD9364D6DF901D44C5BD80E33278D4D4AD705D22C9757FA2B52B3

SHA-512: 4E955F122EFDB59443FD78DD5F599AA7C3E03A0014A5404676B382AE85E40304D2DA68EE402E007424F596682E786C7E53E2A1D224342ABFB06F545EBC1A3B1F

Malicious: false

Reputation: low

C:\Users\HERBBL~1\AppData\Local\Temp\CabA333.tmp

C:\Users\HERBBL~1\AppData\Local\Temp\CabA371.tmp

Process: C:\Program Files\Internet Explorer\iexplore.exe

File Type: Microsoft Cabinet archive data, 55153 bytes, 1 file

Size (bytes): 55153

Entropy (8bit): 7.995722006815289

Encrypted: true

MD5: C80707FEAA56B9F5F9F299A70A89A675

SHA1: 2DD4AA8EB8E0AD265AFA6FDEF00FCC1625CA959C

SHA-256: 8573C2B9348FD9364D6DF901D44C5BD80E33278D4D4AD705D22C9757FA2B52B3

SHA-512: 4E955F122EFDB59443FD78DD5F599AA7C3E03A0014A5404676B382AE85E40304D2DA68EE402E007424F596682E786C7E53E2A1D224342ABFB06F545EBC1A3B1F

Malicious: false

Reputation: low

C:\Users\HERBBL~1\AppData\Local\Temp\TarA33E.tmpProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: data

Size (bytes): 133284

Entropy (8bit): 6.411417607676471

Encrypted: false

MD5: CD81F6A51AEC72583E68BF8219904438

SHA1: 724924A6C906D3953E7B92BD5CC12DAE27C772E3

SHA-256: 540CB7459D0FD892B5C540F293E04AA3A049E65C0FB17F3B2E6245B37530C1D0

SHA-512: 33FA38041F42317B1E36F673A7E27889483BA691ECA127EDC0A191D9B4F6F663AD44E8AF84948B77A13FD64D4DFC0CB7A178AF64CA16D5A714F41B6264944E2E

Malicious: false

Reputation: low

C:\Users\HERBBL~1\AppData\Local\Temp\TarA372.tmpProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: data

Size (bytes): 133284

Entropy (8bit): 6.411417607676471

Encrypted: false

MD5: CD81F6A51AEC72583E68BF8219904438

SHA1: 724924A6C906D3953E7B92BD5CC12DAE27C772E3

SHA-256: 540CB7459D0FD892B5C540F293E04AA3A049E65C0FB17F3B2E6245B37530C1D0

SHA-512: 33FA38041F42317B1E36F673A7E27889483BA691ECA127EDC0A191D9B4F6F663AD44E8AF84948B77A13FD64D4DFC0CB7A178AF64CA16D5A714F41B6264944E2E

Malicious: false

Reputation: low

C:\Users\HERBBL~1\AppData\Local\Temp\~DF7841B9D409ACE668.TMPProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: FoxPro FPT, blocks size 258, next free block index 16711424

Size (bytes): 45451

Entropy (8bit): 1.1042831288235544

Encrypted: false

MD5: 2336ED4371C20354B93B39665B5AEAB8

SHA1: 568990C77C83DEA9E5C3E4AAF7EB692B0E6DE87A

SHA-256: 514EAB2D91A589527BE5705197C70C904A674230AF9A40E52F0C7EFC905AF016

SHA-512: BEC0F5F218BA5A4D0E70B6B18E4B9ED5C526FB3097AC8B0CD70BA6C777556236A81E9F4984B7056B81743EAAB0B2D61D6B87D3532A7FCF26A486F2FE923F0247

Malicious: false

Copyright Joe Security LLC 2018 Page 10 of 51

Page 11: Automated Malware Analysis Report for https ...

Reputation: low

C:\Users\HERBBL~1\AppData\Local\Temp\~DF7841B9D409ACE668.TMP

C:\Users\HERBBL~1\AppData\Local\Temp\~DFA960C827CBAC7421.TMPProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: FoxPro FPT, blocks size 258, next free block index 16711424

Size (bytes): 25441

Entropy (8bit): 0.4152951728653103

Encrypted: false

MD5: 215F78B2DB9E172A1FDBF3FB7F329AAD

SHA1: 54A1395E027B0A2A4B59D0519B81AA29ED92C872

SHA-256: BB346D57D1FD4047B7201CE0639DD16AF3721DC4AE76E3F37A0AEAB4BF040A7C

SHA-512: 475483C27335D6F9DB414E7B482D3B08E1133A3B6D425CB9E7B7EE7409EB91AAD7C60D672AEF9244F4AC5155C00BAEA797173DFA8B8E00918753247A4AAC0B9C

Malicious: false

Reputation: low

C:\Users\HERBBL~1\AppData\Local\Temp\~DFF615DFF3AC0964D1.TMPProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: FoxPro FPT, blocks size 258, next free block index 16711424

Size (bytes): 13029

Entropy (8bit): 0.4816780948804066

Encrypted: false

MD5: DBAEE9AE5616DC8F57B6D59C1CFA63A8

SHA1: 28C1403C5BD6C6947BF76729F77135DD8F9B26BF

SHA-256: A9CBAFB50D4E19C071EA181A883095FBD1A4FD66ECFAF5331794F8839AB9288F

SHA-512: AE2C82EA077B9732F8D93F2398F3B5B5F535A0CDED412377C9EE3406029A70EC9D6F2766D53FCDC2A12B088641A153A0B2A9E05E6F4F4BBA1E8DE0D0BB20EA1F

Malicious: false

Reputation: low

C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506

Process: C:\Program Files\Internet Explorer\iexplore.exe

File Type: Microsoft Cabinet archive data, 55153 bytes, 1 file

Size (bytes): 165459

Entropy (8bit): 7.995722006815289

Encrypted: true

MD5: 3019518B9FCDBEB5BF82F2C380069127

SHA1: B9850D066A3E1193900968516692D672842FA989

SHA-256: C4F17508CF5EF2CDF95E757F229001CC6805B6AAB030224C1EB5F05A82B67789

SHA-512: ACA9DBEB7C02BA95B794A85325A54D07D96592AEB35AC765865C19286F364397B5DC37E5916B76C3C5680F93897D7278D046372B943D9EC5CCA46F45612D4AA5

Malicious: false

Reputation: low

C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15AProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: data

Size (bytes): 1786

Entropy (8bit): 7.366016576663508

Encrypted: false

MD5: 6AEB4E76C6F68EFD7A48092E9F0F3492

SHA1: 823A035C0BDCC3DC09C881E788F7FACA53C6B458

SHA-256: FE1B9A0EABF44FDBE4DDE97C3CC1209FAD2FBB2D2D7476FFBF64066BD9919A4F

SHA-512: 50D98FB4C9875B1AED0AEC06A9C934DB5010B6C5F54539E323EC14FD487E1D92D01652E4614DDF308AB2F1EDEA9E9CB1E23030C971255CC106016C6E7BBAF48C

Malicious: false

Reputation: low

C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506Process: C:\Program Files\Internet Explorer\iexplore.exe

File Type: data

Size (bytes): 984

Entropy (8bit): 3.167938743106185

Encrypted: false

MD5: DA283C3884B004F71DB95D2C80591EE9

SHA1: F7846E8874EB4FF56363300C282893F0320AA62B

Copyright Joe Security LLC 2018 Page 11 of 51

Page 12: Automated Malware Analysis Report for https ...

SHA-256: 99325C8EEAA06BB8FE23EA1CE6D3D0F73D0912543EE5757C04A937E146E19DB5

SHA-512: 8DC7E1966B6369EE4BE33A315936BC44538C20FC80AC4B988F5DC3603A7E0A80E0FAAE299377A7E313937B2998634CF90E79D791991D5FF7B6FCDAF0E96C1A19

Malicious: false

Reputation: low

C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15AProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: data

Size (bytes): 424

Entropy (8bit): 2.831036132460234

Encrypted: false

MD5: EDB75ECBA650EE570812370A6AE5FEB2

SHA1: 8765C41F43AADF5501EC0458C370D1530316C19C

SHA-256: F96441429A60B00E17A01DBE838E09F9CA7CE1B311784AA17104ACA3B5717815

SHA-512: 38BE3BE26DD74A3FFFF59E2AD0353BCA3B17316C2DC360637BCF7B6625FA13009E8785E1ED55EC78875D03CA0B41226D4AB9BBD249BE379173F88422A15267BA

Malicious: false

Reputation: low

C:\Users\user\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: PNG image data, 16 x 16, 4-bit colormap, non-interlaced

Size (bytes): 237

Entropy (8bit): 6.1480026084285395

Encrypted: false

MD5: 9FB559A691078558E77D6848202F6541

SHA1: EA13848D33C2C7F4F4BAA39348AEB1DBFAD3DF31

SHA-256: 6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914

SHA-512: 0E08938568CD123BE8A20B87D9A3AAF5CB05249DE7F8286FF99D3FA35FC7AF7A9D9797DD6EFB6D1E722147DCFB74437DE520395234D0009D452FB96A8ECE236B

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D02F57C1-B628-11E8-B7AC-B2C276BF9C88}.datProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: Microsoft Word Document

Size (bytes): 30296

Entropy (8bit): 1.8548506985527198

Encrypted: false

MD5: 01798E382E6AD5C9204DEDB799BEB289

SHA1: 5E87D5E704717D0AACFCFAEA409F7C694657C023

SHA-256: 780CEFB0D5DFAF7A2CF70D5868228654C128A5AFFC73360313EB07C4F99394C9

SHA-512: 2B211A83FF37DE849F421555F257ED43A413E3D00A4B628654C7FDEA6AA9F6E66169401A23FDBD31CBB0995C205ED42B220354A5443E7EBA972F2BB17FFBF2D6

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D02F57C3-B628-11E8-B7AC-B2C276BF9C88}.datProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: Microsoft Word Document

Size (bytes): 41782

Entropy (8bit): 2.0204491501303075

Encrypted: false

MD5: 02F6D83B438FA61A447784BF949B21EC

SHA1: 2D4A01BB249FB0F5C7310F127CD605B461722BBE

SHA-256: AB0BB44246F0B490E8F7A0A8AE045E1711DFFC913827E763A581B2BC9248D841

SHA-512: 2F5A8E30CB7A9D5AA7E1EF97B925615FFDECF8045289275DDD53CC8C7F31E6B3D6172FE6041D2BC1B1201798C7E84B490B27B442774901CFCD79C9B37C376C24

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D971B090-B628-11E8-B7AC-B2C276BF9C88}.datProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: Microsoft Word Document

Size (bytes): 16984

Copyright Joe Security LLC 2018 Page 12 of 51

Page 13: Automated Malware Analysis Report for https ...

Entropy (8bit): 1.5678810513302062

Encrypted: false

MD5: 217CF0E0026868B42A651D497C7F729D

SHA1: 8FF8C85A40320D524A951592111B8D2DF07E7B44

SHA-256: FBCBAB3D2452B61F1C9061B5705906D84AD923B3155F67CD1537BB680D24E119

SHA-512: 7E4DB066F9D03E4F2A93BA980C4D1B077103FA7BB4B5BB9445E8648BDA288C32F32E744CAD09711252B9A8BC462E2CDE427D23EE4635FDDBD3925EDE74FFDBB4

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D971B090-B628-11E8-B7AC-B2C276BF9C88}.dat

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\fb4mf11\imagestore.datProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: data

Size (bytes): 18056

Entropy (8bit): 3.070479017375001

Encrypted: false

MD5: A76EBE8AE05EE2E096E541C981BB3B94

SHA1: 2B1DE975558FA20036545EA10BD1E664B06C18FA

SHA-256: BE1CB533A3DFC5CFBF40FC51ADF25C4B7CE0E2844596529AF4316CE6BA168416

SHA-512: 45B67CCDCDCD36FD1A9CBB8235D50867A354527E8809D6F790897BFF5BA7B506C3AA94C4D2E8A2AA91E32A3E48CE88AC97301F90CA8F191E21FC077D37E9E06B

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0316J1PS\CJURRMQR.jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text

Size (bytes): 471

Entropy (8bit): 5.367538484345463

Encrypted: false

MD5: D7CAD93AE1377A8E0613F6A3F78BCC28

SHA1: 9BEE112917F4FE5812418EFF0259E973AB073C7D

SHA-256: 92E7D3574C910C244B966386027B08587479A7BB689862AF7CE9C42716A04582

SHA-512: 7F93CFD7D571E7DD59DDC66C41CAF4DB191A906B67EB92ADED6CDF3D35DDF1405B1916DD132BDDBA759E19998809DE0DDCECF848C94D0A7DCBB7A61E59CA3DA4

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0316J1PS\dropdown_caret_KXSZjGsyILZaoTf0sI9X-A2[1].svgProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: HTML document, ASCII text, with no line terminators

Size (bytes): 224

Entropy (8bit): 5.06613033531508

Encrypted: false

MD5: 2974998C6B3220B65AA137F4B08F57F8

SHA1: F4F08DA689179DE68EE40CD12ECDCC5AC54B3979

SHA-256: 96D52BD03E244A44931A541A807067792D638DD29EC14A87A78F2BE85D12D19A

SHA-512: 6B4F2439CA99109A7C97828E5972A8E7C7FCA3745B2FB4738EBD9329A99234A8CD3BC4C0C48B5BAA917D4BAA64CDAEB5D74456DEFDDDA3E07FAA803283BE0287

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0316J1PS\favicon[1].icoProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: PNG image data, 16 x 16, 4-bit colormap, non-interlaced

Size (bytes): 237

Entropy (8bit): 6.1480026084285395

Encrypted: false

MD5: 9FB559A691078558E77D6848202F6541

SHA1: EA13848D33C2C7F4F4BAA39348AEB1DBFAD3DF31

SHA-256: 6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914

SHA-512: 0E08938568CD123BE8A20B87D9A3AAF5CB05249DE7F8286FF99D3FA35FC7AF7A9D9797DD6EFB6D1E722147DCFB74437DE520395234D0009D452FB96A8ECE236B

Malicious: false

Reputation: low

Copyright Joe Security LLC 2018 Page 13 of 51

Page 14: Automated Malware Analysis Report for https ...

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0316J1PS\lwsignupheaderjs_4NYTMbxtFAmu44aIr74B-Q2[1].jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines

Size (bytes): 2945

Entropy (8bit): 5.188731404557618

Encrypted: false

MD5: E0D61331BC6D1409AEE38688AFBE01F9

SHA1: 5971B99110C03B1F06D4233A8600424E13091402

SHA-256: A6C34133045C138804A8B5E09948191228EEB112DE8F5EDF8E0BD9087D4863B1

SHA-512: 62D10BC02534F9877A86FE22A24F246F262A266E76095206F076C3B98AC33E956DEFF2B452544CCEB51524626A0C8F6B21B8E3C623FC67BEAD4519B881C36E58

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0316J1PS\microsoft_logo_7lyNn7YkjJOP0NwZNw6QvQ2[1].svgProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: HTML document, ASCII text, with very long lines, with no line terminators

Size (bytes): 3651

Entropy (8bit): 4.094801914706141

Encrypted: false

MD5: EE5C8D9FB6248C938FD0DC19370E90BD

SHA1: D01A22720918B781338B5BBF9202B241A5F99EE4

SHA-256: 04D29248EE3A13A074518C93A18D6EFC491BF1F298F9B87FC989A6AE4B9FAD7A

SHA-512: C77215B729D0E60C97F075998E88775CD0F813B4D094DC2FDD13E5711D16F4E5993D4521D0FBD5BF7150B0DBE253D88B1B1FF60901F053113C5D7C1919852D58

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0316J1PS\toda[1].htmProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: HTML document, UTF-8 Unicode text, with very long lines

Size (bytes): 9104

Entropy (8bit): 5.167752533229103

Encrypted: false

MD5: 3953B962EE827FAC85B93F963B1AEA03

SHA1: F24238455F029CDCB3330FDEC323AC5DE697703C

SHA-256: 90329DBC46F89EAB22E47C0A5F583FF89CAF550F5BC03AB17E8856C2CB898EC1

SHA-512: 64186AF54465CBF1E2B2B14360B854819BEDE1DD881DA79BA32F2D3405C7B20CDF369D459F33C38643DD4B05159D3A5E17467C1752F250F79122E99891FFE560

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0TZNT9WD\XLKPS2VW.htmProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: HTML document, ASCII text, with very long lines, with CRLF, LF line terminators

Size (bytes): 101569

Entropy (8bit): 5.066377587551446

Encrypted: false

MD5: 2F15F172CE5CA58A59042E86BBE4F1C2

SHA1: 34E5BB35C9CF8F526FC3F4B66F0CAF35EA8DADFB

SHA-256: 7E2EF2FDB2D03E5E58DF986EA31E6AFD16D7FF8EBDC3C3750C3F7974BF8D2D6B

SHA-512: 9849EA722C95CCB0422E8106D1AC06A9630140334C519526B0E905CB894A6A09D533098DA15032AECB143CA68290D1E654A3E5571FD02F79E99F7FBD50939C34

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0TZNT9WD\converged_ux_v2_YJYF-HC1p6_xgEs_dFAP2w2[1].cssProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines

Size (bytes): 85262

Entropy (8bit): 5.315325524296009

Encrypted: false

MD5: 609605F870B5A7AFF1804B3F74500FDB

SHA1: 05E4602769E4023DEF38AEEE5E99A12ABAA67E49

SHA-256: B2507057E3A4A2E458F6209088806D635019F1CCFA32528BE7F0025F9BDE6AD6

Copyright Joe Security LLC 2018 Page 14 of 51

Page 15: Automated Malware Analysis Report for https ...

SHA-512: C96843DE396A0FCC00D139F65AE88E93F28C8F1B77172850F66822E47D4383FE5D6B21ED46F3CF305BB5AE9E1D447E4790F70B15F798B6B2FF31C4A3A43E1372

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0TZNT9WD\converged_ux_v2_YJYF-HC1p6_xgEs_dFAP2w2[1].css

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0TZNT9WD\convergedbg_small_v2_Z9GCPpM7FVE8hxRSZUez6g2[1].jpgProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: JPEG image data

Size (bytes): 2903

Entropy (8bit): 2.764428854727822

Encrypted: false

MD5: 67D1823E933B15513C8714526547B3EA

SHA1: DD34A6DBED1433C8472FC6CCD2FB7477CBBC8DA1

SHA-256: D36E606F9E0B062FE0AFC928875C99B8C5A931E9B29BE7EC19159D6DBADF8F5B

SHA-512: C83C1AD6AFB5514FB1318C065718AEF0D12FB64F95F160B1B23FB5A9A99531FB3B26CA0714CE84AFE5B4694E6966D104D6B1239EBF0B19E1F72B1533270DE888

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0TZNT9WD\convergedbg_v2_pdvUOT_2pyXH5ith335y8A2[1].jpgProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: JPEG image data

Size (bytes): 283351

Entropy (8bit): 7.975896455873056

Encrypted: false

MD5: A5DBD4393FF6A725C7E62B61DF7E72F0

SHA1: 55B292F885FFC92ABCE18750B07AA4ACFA4E903E

SHA-256: 211A907DE2DA0FF4A0E90917AC8054E2F35C351180977550C26E51B4909F2BEB

SHA-512: 850586A05B67EF25492BD50A090F1EC0A0CC21DC4E4EFEB35E19CDC78A98F9415A3807318FA02664EADE87F0E2D8FA2A2958CD0D712329800FC05689E01DC614

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0TZNT9WD\css[1].cssProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text

Size (bytes): 2479

Entropy (8bit): 5.231159050490463

Encrypted: false

MD5: 202AFE83FA85D0E4045E81B09097A767

SHA1: CC1B8CAC53B958DD238495E72E961FC50B2BF807

SHA-256: F39B08026A854C373F45F8A09AA2A3A3E879293055A1939DF50F9ED6E83C2640

SHA-512: BAD0F6A03F931CAEA52DE5EC800EF1F754F908228C7F29777485E5821D5DE69EA87FA30BBB4373FF157193316D372D576051F747659841FC4B94D5193291B562

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0TZNT9WD\jquerypackage_1.10_5V7LAuc3bNAQx2QQfr1RPw2[1].jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: UTF-8 Unicode text, with very long lines

Size (bytes): 96649

Entropy (8bit): 5.297804550899051

Encrypted: false

MD5: E55ECB02E7376CD010C764107EBD513F

SHA1: FA6D184DF01EC535628DC8FAF38211591BAADFC8

SHA-256: 5776881753B95A0ABE5D1F6EFE3ABE7B83A3265EACCD117DD948E523C044600C

SHA-512: 099C665E1CEE8DF9C5D5C340A14170341BD29E0321875FF08E594B750CFDBF2CA8C9B45B584FCA21F87CBE6CD8A170918CECFF8C9796AAFA3D89F0AA97509ABD

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0TZNT9WD\mscc-0.4.1.min[1].cssProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines, with no line terminators

Copyright Joe Security LLC 2018 Page 15 of 51

Page 16: Automated Malware Analysis Report for https ...

Size (bytes): 1417

Entropy (8bit): 5.016922591832701

Encrypted: false

MD5: D8C2B180C40BCC7FFCBE2C68B57D8FA2

SHA1: 580342C029A2553110A866FA9B25E5C45CDE2EA3

SHA-256: 35211F76C4C35C17F2649B96868C0D691F1D78B107F7635D22619948D0EE6880

SHA-512: CF3DF5F597ED1444C4A2F9FB0FFC5E2B5D27E0703C6D589CE3A9154FCF530CEFCA1D74427B3D7309710700EF93E14CB1F95313CD62596B9C70620FE93A527B19

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0TZNT9WD\mscc-0.4.1.min[1].css

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0TZNT9WD\tether.min[1].jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines, with no line terminators

Size (bytes): 24989

Entropy (8bit): 5.18502272346698

Encrypted: false

MD5: ECDFD3DC464CEDA5F483BB5C96A6E3D2

SHA1: CBDD0A2B2DD7A9CFC5DB3F33E34323AFA0CA55A3

SHA-256: 80BD626EB6D57112072A508EE4E5CE3C2FE5673FE0A5D029810033B24AAA5E9F

SHA-512: 1EC6758BDBE5A34D656DA7BE28897FFFA28FC6438EEB148F2363DE7EC6620BC2E6496F4A0D63182BD8E136A13D5EC6E31B2AE740067AB121EFB67475DAC24F8C

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\77PTX9DT\_[1].htmProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: HTML document, ASCII text

Size (bytes): 238

Entropy (8bit): 5.124160197356316

Encrypted: false

MD5: 092E3C9774B6BB2887DFA7BD33CBBF38

SHA1: 98496E57C52A996039500FBEEA5ABB489F3BF33C

SHA-256: 381D83E36082F06B92192CBD06A85F0BAAEA3C2FEB27FDCEADA31CAB9C296767

SHA-512: 46D8F4162015DA17987F0925CD8C20868FF0C703B801B633B567E0E18632EC44A775877D8F66FA6BF0DBDAB0748D3CE088C390EAB7A0581249421FBF39D24D7B

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\77PTX9DT\bootstrap.min[1].jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines

Size (bytes): 48944

Entropy (8bit): 5.272507874206726

Encrypted: false

MD5: 14D449EB8876FA55E1EF3C2CC52B0C17

SHA1: A9545831803B1359CFEED47E3B4D6BAE68E40E99

SHA-256: E7ED36CEEE5450B4243BBC35188AFABDFB4280C7C57597001DE0ED167299B01B

SHA-512: 00D9069B9BD29AD0DAA0503F341D67549CCE28E888E1AFFD1A2A45B64A4C1BC460D81CFC4751857F991F2F4FB3D2572FD97FCA651BA0C2B0255530209B182F22

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\77PTX9DT\convergedsignuptemplatespackage_aYR8hjVci_2gpjM-90byVA2[1].jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: exported SGML document, ASCII text, with very long lines

Size (bytes): 3338

Entropy (8bit): 5.172754441390814

Encrypted: false

MD5: 69847C86355C8BFDA0A6333EF746F254

SHA1: 8D030E6556402855DFEF8F40A592C3E3BB7AD53B

SHA-256: 34FF3F061E265EF266AF3FD75F68ED2D76F189ED9CC4DE9BB0C2110D43F90F66

SHA-512: 07960D268A1B6C46AE23B141C541F27610B6BEC5419E37C32ECFA89A0641AA2E139AC78618BCCD40483F62D92C00B86ABDD247F4A3918A305E156F0F8621D0F9

Malicious: false

Copyright Joe Security LLC 2018 Page 16 of 51

Page 17: Automated Malware Analysis Report for https ...

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\77PTX9DT\convergedsignuptemplatespackage_aYR8hjVci_2gpjM-90byVA2[1].js

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\77PTX9DT\favicon[1].pngProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: MS Windows icon resource - 6 icons, 16-colors

Size (bytes): 17174

Entropy (8bit): 2.912971511673274

Encrypted: false

MD5: 12E3DAC858061D088023B2BD48E2FA96

SHA1: E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5

SHA-256: 90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21

SHA-512: C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\77PTX9DT\jquery-3.1.1.slim.min[1].jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines

Size (bytes): 69309

Entropy (8bit): 5.3700159283175415

Encrypted: false

MD5: 550DDFE84A114F79A767C087DF97F3BC

SHA1: 310BD0C04196573315C2E8446776685AC2961724

SHA-256: FD222B36ABFC87A406283B8DA0B180E22ADEB7E9327AC0A41C6CD5514574B217

SHA-512: B6A9146FFE380A32C89D48BAF900DD5E346B0D603B8AFCFAD070970E56BDC744E8A8B053C2EF8A3107F4A3C2BDD11EE470E05557F542FFEDE5FF54468EE186C4

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\77PTX9DT\microbg[1].jpgProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: JPEG image data, JFIF standard 1.01

Size (bytes): 259416

Entropy (8bit): 7.9781594411712575

Encrypted: false

MD5: C58B50331BCDD1C2B4FFB5E7A456E08A

SHA1: 2D4E7108635F07451A2578D9F847BDC4023F279D

SHA-256: 2777ABE0312E6B49428D5D7F7F42E43AF620793F86F823F2E045968AFBDDDB63

SHA-512: BC269C47452E49097C1CF91EA527408234263C7039FAEA08EE57F80E53FC6F813737C07FFF0731D40AB1AE2A9AFCACC1E1433F4A0C8A36F3860DC32FF42ED6A6

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\77PTX9DT\mscc-0.4.1.min[1].jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines, with no line terminators

Size (bytes): 3560

Entropy (8bit): 5.226312832132134

Encrypted: false

MD5: 5E9A1F4AA31D4AA60F6F899A2E45CEF8

SHA1: 460F6C21B08FA2723DBBC68613ABDF18213B2FAA

SHA-256: C87516D7DD7077EDD467F5B7B085B035CD4803ECF049670AB19DE004E270ABA8

SHA-512: 9AB7DAF8C92879019AFEBA5A8F04A593DE048233380C1A3FA071DCA0F51F9A9ACC12969C852CD8BF675744F25B4FA0A5D1EA82BB22FE6C3887FEBC797E943E86

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DEWWYACU\bootstrap.min[1].cssProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines

Size (bytes): 144877

Entropy (8bit): 5.049937202697915

Encrypted: false

MD5: 450FC463B8B1A349DF717056FBB3E078

Copyright Joe Security LLC 2018 Page 17 of 51

Page 18: Automated Malware Analysis Report for https ...

SHA1: 895125A4522A3B10EE7ADA06EE6503587CBF95C5

SHA-256: 2C0F3DCFE93D7E380C290FE4AB838ED8CADFF1596D62697F5444BE460D1F876D

SHA-512: 93BF1ED5F6D8B34F53413A86EFD4A925D578C97ABC757EA871F3F46F340745E4126C48219D2E8040713605B64A9ECF7AD986AA8102F5EA5ECF9228801D962F5D

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DEWWYACU\bootstrap.min[1].css

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DEWWYACU\font-awesome.min[1].cssProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines

Size (bytes): 31000

Entropy (8bit): 4.746143404849733

Encrypted: false

MD5: 269550530CC127B6AA5A35925A7DE6CE

SHA1: 512C7D79033E3028A9BE61B540CF1A6870C896F8

SHA-256: 799AEB25CC0373FDEE0E1B1DB7AD6C2F6A0E058DFADAA3379689F583213190BD

SHA-512: 49F4E24E55FA924FAA8AD7DEBE5FFB2E26D439E25696DF6B6F20E7F766B50EA58EC3DBD61B6305A1ACACD2C80E6E659ACCEE4140F885B9C9E71008E9001FBF4B

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DEWWYACU\get[1].jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines, with CRLF, LF line terminators

Size (bytes): 10579

Entropy (8bit): 5.364684399168358

Encrypted: false

MD5: 560AA43A1CEBC32E07DE96104B885BD8

SHA1: 6C62B28493789CBBE1E850D718590EEF3C1A9059

SHA-256: 64559D23844DBBF1C75C4880A3B489420BF2C3D53E3319DB844679E88BE68842

SHA-512: BE03808548689EA2808EF86CB69015F7FBC10B4DBB6C5E58AF33FAABA9A5B6EE65C27CCB6499F2E3798B710D0A94FFBD48C74EB6111DA1438A73A931EBDC0504

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DEWWYACU\knockout_3.3.0_RcZl9zWsSPzSceyfD4X8cA2[1].jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines, with CRLF line terminators

Size (bytes): 57916

Entropy (8bit): 5.396900907508945

Encrypted: false

MD5: 45C665F735AC48FCD271EC9F0F85FC70

SHA1: D57F3E09B272DB08541A6801CCC96DF80C07A2A3

SHA-256: 0481B1484C0BBCF93EB7FD40F1C88935A38841682C99947FBEA2A0EC48A236F9

SHA-512: DB1676856A8667A309C6C15416AE717814913198D3D63BB26F9A9BF4C13C0C5EBD7EA09445AA9C85B6DC7AFC48F9FA7FDDC34F09D16E96EB67E968082C3E906F

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DEWWYACU\lightweightsignuppackage_7RpZjfuzr_9AqNX2_Jn1jw2[1].jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text, with very long lines

Size (bytes): 175953

Entropy (8bit): 5.411280156435796

Encrypted: false

MD5: ED1A598DFBB3AFFF40A8D5F6FC99F58F

SHA1: 186BED97A4214CDD32DB343BD5968A9DFC676B51

SHA-256: 9DD781F118774FAD631A3C9EA9B80CD32680BF6431B699183009B5CE32AE32C7

SHA-512: 3DAB15661088803A7B7D0812790E0CA62B8F130A2D8B64D5DF672C866D546033B3709137045101887C8F75DAFDC97E338CB42AAA87E76B3BDD64026A136DC184

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DEWWYACU\lwsignupstringscountrybirthdate_en-us_5K647cnxPf8Z-1jWJbLIqQ2[1].jsProcess: C:\Program Files\Internet Explorer\iexplore.exe

Copyright Joe Security LLC 2018 Page 18 of 51

Page 19: Automated Malware Analysis Report for https ...

File Type: HTML document, UTF-8 Unicode text, with very long lines

Size (bytes): 26487

Entropy (8bit): 5.069714411646033

Encrypted: false

MD5: E4AEB8EDC9F13DFF19FB58D625B2C8A9

SHA1: 27751CE218AA0488C0FDA2546AB21ABF5B9501B3

SHA-256: A62A5C950E4B03D613EEE94EBFF644FFB53BB65D512662161E9586D258EA78B2

SHA-512: 6821A8BC272C92750EB5BFA9AE50FA352EE2D454F7C0D8246E2CEADD79B662E0079A4A82F235534B5C651C01F79A72ACC5BFF0B2470CA308D1F6D6B9BC6356BF

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DEWWYACU\lwsignupstringscountrybirthdate_en-us_5K647cnxPf8Z-1jWJbLIqQ2[1].js

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DEWWYACU\style[1].cssProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: ASCII text

Size (bytes): 10088

Entropy (8bit): 5.06703500664872

Encrypted: false

MD5: E4C124F84BE2A66C6069E569257E6CF3

SHA1: E9B6E3207CEAF681F763A49EBCD71837A8EA5CFB

SHA-256: 4DA858A3EC305F55BAFB14B408E69398AE8E7AA76AC67025EEC6A2534C592B64

SHA-512: 7C5C533AECBC3865B4794411256D2AAC628E7AB9AA508C3E06FCCED49F2F6B46D1D7719944F914C63D9332C9F40493A6DDAE5B1BAD2532E4D547960EDF67FD1D

Malicious: false

Reputation: low

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DEWWYACU\urlblockindex[1].binProcess: C:\Program Files\Internet Explorer\iexplore.exe

File Type: data

Size (bytes): 16

Entropy (8bit): 1.6216407621868583

Encrypted: false

MD5: FA518E3DFAE8CA3A0E495460FD60C791

SHA1: E4F30E49120657D37267C0162FD4A08934800C69

SHA-256: 775853600060162C4B4E5F883F9FD5A278E61C471B3EE1826396B6D129499AA7

SHA-512: D21667F3FB081D39B579178E74E9BB1B6E9A97F2659029C165729A58F1787DC0ADADD980CD026C7A601D416665A81AC13A69E49A6A2FE2FDD0967938AA645C07

Malicious: false

Reputation: low

Name IP Active Malicious Antivirus Detection Reputation

cds.s5x3j6q5.hwcdn.net 205.185.208.52 true false high

cdnjs.cloudflare.com 104.19.199.151 true false high

apps.digsigtrust.com 192.35.177.64 true false high

wut-scu-prod.cloudapp.net 104.210.217.114 true false 0%, virustotal, Browse unknown

cds.j3z9t3p6.hwcdn.net 209.197.3.15 true false high

classskincare.com 103.8.27.160 true false 1%, virustotal, Browse unknown

vs.login.msa.akadns6.net 131.253.61.68 true false high

firozenterprise.com 104.219.251.196 true false 0%, virustotal, Browse unknown

wut-eu-prod.cloudapp.net 23.101.132.125 true false 0%, virustotal, Browse unknown

signup.live.com unknown unknown false high

code.jquery.com unknown unknown false high

account.azureedge.net unknown unknown false high

maxcdn.bootstrapcdn.com unknown unknown false high

Domains and IPs

Contacted Domains

URLs from Memory and Binaries

Copyright Joe Security LLC 2018 Page 19 of 51

Page 20: Automated Malware Analysis Report for https ...

Name Source Malicious Antivirus Detection Reputation

http://fontawesome.io font-awesome.min[1].css.1.dr false high

https://classskincare.com/%3c/ _[1].htm.1.dr true Avira URL Cloud: phishing unknown

http://jquery.org/license jquerypackage_1.10_5V7LAuc3bNAQx2QQfr1RPw2[1].js.1.dr

false high

https://firozenterprise.com/memo/toda/n {D02F57C3-B628-11E8-B7AC-B2C276BF9C88}.dat.0.dr

false Avira URL Cloud: safe unknown

https://signup.live.com toda[1].htm.1.dr false high

https://signup.live.com/?lic=1 {D02F57C3-B628-11E8-B7AC-B2C276BF9C88}.dat.0.dr

false high

http://sizzlejs.com/ jquerypackage_1.10_5V7LAuc3bNAQx2QQfr1RPw2[1].js.1.dr

false high

https://account.azureedge.net/lwsignupheaderjs_4NYTMbxtFAmu44aIr74B-Q2.js?v=1

XLKPS2VW.htm.1.dr false high

https://account.azureedge.net/convergedsignuptemplatespackage_aYR8hjVci_2gpjM-90byVA2.js?v=1

XLKPS2VW.htm.1.dr false high

https://signup.live.co {D02F57C3-B628-11E8-B7AC-B2C276BF9C88}.dat.0.dr

false Avira URL Cloud: safe unknown

https://firozenterprise.com/memo/toda/Root {D02F57C3-B628-11E8-B7AC-B2C276BF9C88}.dat.0.dr

false Avira URL Cloud: safe unknown

http://knockoutjs.com/ knockout_3.3.0_RcZl9zWsSPzSceyfD4X8cA2[1].js.1.dr

false high

https://github.com/douglascrockford/JSON-js XLKPS2VW.htm.1.dr false high

https://signup.live.com/error.aspx?errcode=1045&mkt=en-US

XLKPS2VW.htm.1.dr false high

http://opensource.org/licenses/mit-license.php) lightweightsignuppackage_7RpZjfuzr_9AqNX2_Jn1jw2[1].js.1.dr

false high

https://signup.live.coe.com/memo/toda/n {D02F57C3-B628-11E8-B7AC-B2C276BF9C88}.dat.0.dr

false Avira URL Cloud: safe low

https://account.azureedge.net/images/convergedbg_small_v2_Z9GCPpM7FVE8hxRSZUez6g2.jpg)

XLKPS2VW.htm.1.dr false high

http://www.json.org/json2.js knockout_3.3.0_RcZl9zWsSPzSceyfD4X8cA2[1].js.1.dr

false high

https://firozenterprise.com/memo/toda/BSign {D02F57C3-B628-11E8-B7AC-B2C276BF9C88}.dat.0.dr

false Avira URL Cloud: safe unknown

https://account.azureedge.net/knockout_3.3.0_RcZl9zWsSPzSceyfD4X8cA2.js?v=1

XLKPS2VW.htm.1.dr false high

http://fontawesome.io/license font-awesome.min[1].css.1.dr false high

https://account.azureedge.net/images/convergedbg_v2_pdvUOT_2pyXH5ith335y8A2.jpg)

XLKPS2VW.htm.1.dr false high

https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css

toda[1].htm.1.dr false high

https://code.jquery.com/jquery-3.1.1.slim.min.js toda[1].htm.1.dr false high

https://github.com/twbs/bootstrap/graphs/contributors) bootstrap.min[1].js.1.dr false high

http://www.opensource.org/licenses/mit-license.php) knockout_3.3.0_RcZl9zWsSPzSceyfD4X8cA2[1].js.1.dr

false high

https://cdnjs.cloudflare.com/ajax/libs/tether/1.4.0/js/tether.min.js

toda[1].htm.1.dr false high

https://getbootstrap.com) bootstrap.min[1].js.1.dr, bootstrap.min[1].css.1.dr

false Avira URL Cloud: safe low

https://account.azureedge.net/converged_ux_v2_YJYF-HC1p6_xgEs_dFAP2w2.css?v=1

XLKPS2VW.htm.1.dr false high

https://account.azureedge.net/images/favicon.ico?v=2~ imagestore.dat.1.dr false high

https://account.azureedge.net/images/favicon.ico?v=2 imagestore.dat.1.dr false high

http://getbootstrap.com) lightweightsignuppackage_7RpZjfuzr_9AqNX2_Jn1jw2[1].js.1.dr

false high

https://github.com/twbs/bootstrap/blob/master/LICENSE) bootstrap.min[1].js.1.dr, bootstrap.min[1].css.1.dr

false high

https://signup.live.com/?lic=1/toda/ ~DF7841B9D409ACE668.TMP.0.dr false high

https://account.azureedge.net/images/favicon.ico?v=2~( imagestore.dat.1.dr false high

https://account.azureedge.net/lightweightsignuppackage_7RpZjfuzr_9AqNX2_Jn1jw2.js?v=1

XLKPS2VW.htm.1.dr false high

https://firozenterprise.com/memo/toda/ {D02F57C3-B628-11E8-B7AC-B2C276BF9C88}.dat.0.dr

false 0%, virustotal, BrowseAvira URL Cloud: safe

unknown

http://jquery.com/ jquerypackage_1.10_5V7LAuc3bNAQx2QQfr1RPw2[1].js.1.dr

false high

https://account.azureedge.net/jquerypackage_1.10_5V7LAuc3bNAQx2QQfr1RPw2.js?v=1

XLKPS2VW.htm.1.dr false high

https://account.azureedge.net/images/microsoft_logo_7lyNn7YkjJOP0NwZNw6QvQ2.svg

XLKPS2VW.htm.1.dr false high

Contacted IPs

Copyright Joe Security LLC 2018 Page 20 of 51

Page 21: Automated Malware Analysis Report for https ...

Static File Info

No static file info

Network Behavior

Network Port Distribution

Total Packets: 84

No. of IPs < 25%

25% < No. of IPs < 50%

50% < No. of IPs < 75%

75% < No. of IPs

IP Country Flag ASN ASN Name Malicious

209.197.3.15 United States 20446 HIGHWINDS3-HighwindsNetworkGroupIncUS

false

104.19.199.151 United States 13335 CLOUDFLARENET-CloudFlareIncUS

false

131.253.61.68 United States 8075 MICROSOFT-CORP-MSN-AS-BLOCK-MicrosoftCorporationUS

false

103.8.27.160 Malaysia 132241 SKSATECH1-MYSKSATECHNOLOGYSDNBHDMY

false

23.101.132.125 United States 8075 MICROSOFT-CORP-MSN-AS-BLOCK-MicrosoftCorporationUS

false

104.219.251.196 United States 22612 NAMECHEAP-NET-NamecheapIncUS

false

104.210.217.114 United States 8075 MICROSOFT-CORP-MSN-AS-BLOCK-MicrosoftCorporationUS

false

205.185.208.52 United States 20446 HIGHWINDS3-HighwindsNetworkGroupIncUS

false

Public

Copyright Joe Security LLC 2018 Page 21 of 51

Page 22: Automated Malware Analysis Report for https ...

• 443 (HTTPS)

• 53 (DNS)

Timestamp Source Port Dest Port Source IP Dest IP

Sep 12, 2018 03:12:05.753777981 CEST 59605 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:05.781326056 CEST 53 59605 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:05.789473057 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:05.790205956 CEST 49162 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.055108070 CEST 443 49161 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.055217028 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.056145906 CEST 443 49162 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.056227922 CEST 49162 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.087362051 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.088013887 CEST 49162 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.353023052 CEST 443 49161 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.353800058 CEST 443 49161 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.353853941 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.353869915 CEST 443 49161 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.353926897 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.354460001 CEST 443 49162 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.354522943 CEST 49162 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.355580091 CEST 443 49161 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.355638981 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.356182098 CEST 443 49162 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.356256962 CEST 49162 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.620929956 CEST 443 49162 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.620975971 CEST 443 49162 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.621207952 CEST 49162 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.621269941 CEST 49162 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.636609077 CEST 443 49162 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.636866093 CEST 49162 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.678587914 CEST 49162 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:06.945642948 CEST 443 49162 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:06.945796967 CEST 49162 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:07.505785942 CEST 443 49161 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:07.505954981 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:07.771650076 CEST 443 49161 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:07.771796942 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:07.890939951 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:08.120699883 CEST 50900 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:08.156605959 CEST 443 49161 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:08.156691074 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:08.164901972 CEST 53 50900 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:08.184778929 CEST 51075 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:08.235457897 CEST 53 51075 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.223212004 CEST 61674 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.237118006 CEST 53 61674 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.261800051 CEST 59291 53 192.168.2.2 8.8.8.8

TCP Packets

Copyright Joe Security LLC 2018 Page 22 of 51

Page 23: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:09.275449038 CEST 53 59291 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.358624935 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:09.624871016 CEST 443 49161 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:09.624986887 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:09.631453991 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:09.934650898 CEST 443 49161 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:09.934766054 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:09.939644098 CEST 443 49161 103.8.27.160 192.168.2.2

Sep 12, 2018 03:12:09.939771891 CEST 49161 443 192.168.2.2 103.8.27.160

Sep 12, 2018 03:12:09.945708990 CEST 63053 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.964410067 CEST 60812 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.966454029 CEST 58523 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.968519926 CEST 65490 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.970535040 CEST 60652 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.972682953 CEST 57729 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.973335981 CEST 53 63053 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.979912043 CEST 53 58523 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.982191086 CEST 65311 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.982964993 CEST 53 65490 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.984534979 CEST 53 60652 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.986278057 CEST 53 57729 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.992141962 CEST 53 60812 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:10.009769917 CEST 53 65311 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:10.013859987 CEST 49165 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.014504910 CEST 49166 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.181991100 CEST 443 49165 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.182208061 CEST 49165 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.182389975 CEST 443 49166 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.182547092 CEST 49166 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.308372974 CEST 49165 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.309083939 CEST 49166 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.427763939 CEST 50323 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:10.441807032 CEST 53 50323 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:10.476474047 CEST 443 49165 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477010012 CEST 443 49165 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477057934 CEST 443 49165 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477092981 CEST 443 49165 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477128029 CEST 49165 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.477221966 CEST 49165 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.477233887 CEST 443 49165 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477263927 CEST 443 49166 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477286100 CEST 49165 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.477300882 CEST 443 49166 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477358103 CEST 443 49166 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477364063 CEST 49166 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.477396011 CEST 443 49166 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477427959 CEST 443 49166 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477459908 CEST 49166 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.477510929 CEST 443 49165 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477559090 CEST 49165 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.477828026 CEST 443 49166 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.477879047 CEST 49166 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.507879972 CEST 49165 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.578946114 CEST 49166 443 192.168.2.2 104.219.251.196

Sep 12, 2018 03:12:10.675978899 CEST 443 49165 104.219.251.196 192.168.2.2

Sep 12, 2018 03:12:10.676067114 CEST 49165 443 192.168.2.2 104.219.251.196

Timestamp Source Port Dest Port Source IP Dest IP

Timestamp Source Port Dest Port Source IP Dest IP

Sep 12, 2018 03:12:05.753777981 CEST 59605 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:05.781326056 CEST 53 59605 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:08.120699883 CEST 50900 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:08.164901972 CEST 53 50900 8.8.8.8 192.168.2.2

UDP Packets

Copyright Joe Security LLC 2018 Page 23 of 51

Page 24: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:08.184778929 CEST 51075 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:08.235457897 CEST 53 51075 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.223212004 CEST 61674 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.237118006 CEST 53 61674 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.261800051 CEST 59291 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.275449038 CEST 53 59291 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.945708990 CEST 63053 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.964410067 CEST 60812 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.966454029 CEST 58523 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.968519926 CEST 65490 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.970535040 CEST 60652 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.972682953 CEST 57729 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.973335981 CEST 53 63053 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.979912043 CEST 53 58523 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.982191086 CEST 65311 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:09.982964993 CEST 53 65490 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.984534979 CEST 53 60652 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.986278057 CEST 53 57729 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:09.992141962 CEST 53 60812 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:10.009769917 CEST 53 65311 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:10.427763939 CEST 50323 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:10.441807032 CEST 53 50323 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:11.127396107 CEST 64115 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:11.141505957 CEST 53 64115 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:11.151834965 CEST 59195 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:11.162287951 CEST 58138 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:11.195790052 CEST 53 58138 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:12.144208908 CEST 59195 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:12.157316923 CEST 53 59195 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:12.782128096 CEST 60708 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:12.784977913 CEST 65034 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:12.812901974 CEST 53 60708 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:12.814280987 CEST 53 65034 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:12.814912081 CEST 58653 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:12.828449011 CEST 57327 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:12.842928886 CEST 53 58653 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:12.855011940 CEST 56352 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:12.856261015 CEST 53 57327 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:12.868711948 CEST 53 56352 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:22.538875103 CEST 62091 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:22.566878080 CEST 53 62091 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:22.877058983 CEST 63509 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:22.934322119 CEST 53 63509 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:24.603408098 CEST 51492 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:24.617285013 CEST 53 51492 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:26.153469086 CEST 62750 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:26.194087982 CEST 53 62750 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:26.593170881 CEST 58913 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:26.630860090 CEST 53 58913 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:27.964826107 CEST 63309 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:28.015818119 CEST 53 63309 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:29.854475021 CEST 52316 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:29.892190933 CEST 53 52316 8.8.8.8 192.168.2.2

Sep 12, 2018 03:12:44.426984072 CEST 65236 53 192.168.2.2 8.8.8.8

Sep 12, 2018 03:12:44.465981960 CEST 53 65236 8.8.8.8 192.168.2.2

Timestamp Source Port Dest Port Source IP Dest IP

Timestamp Source IP Dest IP Trans ID OP Code Name Type Class

Sep 12, 2018 03:12:05.753777981 CEST 192.168.2.2 8.8.8.8 0xf022 Standard query (0)

classskincare.com

A (IP address) IN (0x0001)

Sep 12, 2018 03:12:09.982191086 CEST 192.168.2.2 8.8.8.8 0x65d0 Standard query (0)

firozenterprise.com

A (IP address) IN (0x0001)

Sep 12, 2018 03:12:11.127396107 CEST 192.168.2.2 8.8.8.8 0x4066 Standard query (0)

maxcdn.bootstrapcdn.com

A (IP address) IN (0x0001)

DNS Queries

Copyright Joe Security LLC 2018 Page 24 of 51

Page 25: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:11.151834965 CEST 192.168.2.2 8.8.8.8 0x4717 Standard query (0)

code.jquery.com A (IP address) IN (0x0001)

Sep 12, 2018 03:12:11.162287951 CEST 192.168.2.2 8.8.8.8 0x9cf2 Standard query (0)

cdnjs.cloudflare.com

A (IP address) IN (0x0001)

Sep 12, 2018 03:12:12.144208908 CEST 192.168.2.2 8.8.8.8 0x4717 Standard query (0)

code.jquery.com A (IP address) IN (0x0001)

Sep 12, 2018 03:12:22.538875103 CEST 192.168.2.2 8.8.8.8 0x8113 Standard query (0)

firozenterprise.com

A (IP address) IN (0x0001)

Sep 12, 2018 03:12:22.877058983 CEST 192.168.2.2 8.8.8.8 0x8c25 Standard query (0)

signup.live.com A (IP address) IN (0x0001)

Sep 12, 2018 03:12:26.153469086 CEST 192.168.2.2 8.8.8.8 0x5c02 Standard query (0)

account.azureedge.net

A (IP address) IN (0x0001)

Timestamp Source IP Dest IP Trans ID OP Code Name Type Class

Timestamp Source IP Dest IP Trans ID Replay Code Name CName Address Type Class

Sep 12, 2018 03:12:05.781326056 CEST

8.8.8.8 192.168.2.2 0xf022 No error (0) classskincare.com

103.8.27.160 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:10.009769917 CEST

8.8.8.8 192.168.2.2 0x65d0 No error (0) firozenterprise.com

104.219.251.196 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:11.141505957 CEST

8.8.8.8 192.168.2.2 0x4066 No error (0) maxcdn.bootstrapcdn.com

cds.j3z9t3p6.hwcdn.net CNAME (Canonical name)

IN (0x0001)

Sep 12, 2018 03:12:11.141505957 CEST

8.8.8.8 192.168.2.2 0x4066 No error (0) cds.j3z9t3p6.hwcdn.net

209.197.3.15 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:11.195790052 CEST

8.8.8.8 192.168.2.2 0x9cf2 No error (0) cdnjs.cloudflare.com

104.19.199.151 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:11.195790052 CEST

8.8.8.8 192.168.2.2 0x9cf2 No error (0) cdnjs.cloudflare.com

104.19.196.151 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:11.195790052 CEST

8.8.8.8 192.168.2.2 0x9cf2 No error (0) cdnjs.cloudflare.com

104.19.195.151 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:11.195790052 CEST

8.8.8.8 192.168.2.2 0x9cf2 No error (0) cdnjs.cloudflare.com

104.19.198.151 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:11.195790052 CEST

8.8.8.8 192.168.2.2 0x9cf2 No error (0) cdnjs.cloudflare.com

104.19.197.151 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:12.157316923 CEST

8.8.8.8 192.168.2.2 0x4717 No error (0) code.jquery.com cds.s5x3j6q5.hwcdn.net CNAME (Canonical name)

IN (0x0001)

Sep 12, 2018 03:12:12.157316923 CEST

8.8.8.8 192.168.2.2 0x4717 No error (0) cds.s5x3j6q5.hwcdn.net

205.185.208.52 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:12.812901974 CEST

8.8.8.8 192.168.2.2 0x166b No error (0) apps.digsigtrust.com

192.35.177.64 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:12.842928886 CEST

8.8.8.8 192.168.2.2 0x49a7 No error (0) apps.digsigtrust.com

192.35.177.64 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:12.856261015 CEST

8.8.8.8 192.168.2.2 0x7058 No error (0) apps.digsigtrust.com

192.35.177.64 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:12.868711948 CEST

8.8.8.8 192.168.2.2 0xe503 No error (0) apps.digsigtrust.com

192.35.177.64 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:22.566878080 CEST

8.8.8.8 192.168.2.2 0x8113 No error (0) firozenterprise.com

104.219.251.196 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:22.934322119 CEST

8.8.8.8 192.168.2.2 0x8c25 No error (0) signup.live.com account.msa.akadns6.net CNAME (Canonical name)

IN (0x0001)

Sep 12, 2018 03:12:22.934322119 CEST

8.8.8.8 192.168.2.2 0x8c25 No error (0) account.msa.akadns6.net

msa.aadg.windows.net CNAME (Canonical name)

IN (0x0001)

Sep 12, 2018 03:12:22.934322119 CEST

8.8.8.8 192.168.2.2 0x8c25 No error (0) msa.aadg.windows.net

www.prdtm.aadg.akadns.net

CNAME (Canonical name)

IN (0x0001)

Sep 12, 2018 03:12:24.617285013 CEST

8.8.8.8 192.168.2.2 0x56f2 No error (0) login.msa.akadns6.net

vs.login.msa.akadns6.net CNAME (Canonical name)

IN (0x0001)

DNS Answers

Copyright Joe Security LLC 2018 Page 25 of 51

Page 26: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:24.617285013 CEST

8.8.8.8 192.168.2.2 0x56f2 No error (0) vs.login.msa.akadns6.net

131.253.61.68 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:24.617285013 CEST

8.8.8.8 192.168.2.2 0x56f2 No error (0) vs.login.msa.akadns6.net

131.253.61.82 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:24.617285013 CEST

8.8.8.8 192.168.2.2 0x56f2 No error (0) vs.login.msa.akadns6.net

131.253.61.66 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:26.194087982 CEST

8.8.8.8 192.168.2.2 0x5c02 No error (0) account.azureedge.net

account.akstd.azureedge.net

CNAME (Canonical name)

IN (0x0001)

Sep 12, 2018 03:12:26.194087982 CEST

8.8.8.8 192.168.2.2 0x5c02 No error (0) account.akstd.azureedge.net

cdn-standard.azureedge.net.edgekey.net

CNAME (Canonical name)

IN (0x0001)

Sep 12, 2018 03:12:28.015818119 CEST

8.8.8.8 192.168.2.2 0xc254 No error (0) wut-eu-prod.cloudapp.net

23.101.132.125 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:29.892190933 CEST

8.8.8.8 192.168.2.2 0xe4e0 No error (0) wut-scu-prod.cloudapp.net

104.210.217.114 A (IP address) IN (0x0001)

Sep 12, 2018 03:12:44.465981960 CEST

8.8.8.8 192.168.2.2 0xbd52 No error (0) ie9comview.vo.msecnd.net

cs9.wpc.v0cdn.net CNAME (Canonical name)

IN (0x0001)

Timestamp Source IP Dest IP Trans ID Replay Code Name CName Address Type Class

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Sep 12, 2018 03:12:07.771650076 CEST

443 49161 103.8.27.160 192.168.2.2 CN=classskincare.com CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US

Fri Aug 03 02:00:00 CEST 2018

Fri Nov 02 00:59:59 CET 2018

[[ Version: V3 Subject: CN=classskincare.com Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 26792155959754253741300627754389987417708829936134543954830257229049268906873776208648988267047033488403903705160902789552173646191233437771074635487530616722530869647939855717750983870407796732606300867021293328617851623873862646876456987439864113000500676568337339645455348576804650594456335750608722508716236702905015626709841608107431253309117270019501714619461121183242516231482298302901121706736037094393042900976141580282395032164658665950371900977869871041958028738292963705260058522893745984203315750215205620201246615061394353241376289255635236254975027629851961533181281343315121538535748772919806924406969 public exponent: 65537 Validity: [From: Fri Aug 03 02:00:00 CEST 2018, To: Fri Nov 02 00:59:59 CET 2018] Issuer: CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US SerialNumber: [ b8210ece df0ac78f dd9e7205 66b4ef0d]Certificate Extensions: 10[1]: ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=falseExtension unknown: DER encoded OCTET string =0000: 04 81 F5 04 81 F2 00 F0 00 76 00 EE 4B BD B7 75 .........v..K..u0010: CE 60 BA E1 42 69 1F AB E1 9E 66 A3 0F 7E 5F B0 .`..Bi....f..._.0020: 72 D8 83 00 C4 7B 89 7A A8 FD CB 00 00 01 64 FD r......z......d.0030: 6B AF 12 00 00 04 03 00 47 30 45 02 20 4C 09 4A k.......G0E. L.J0040: 82 04 73 45 53 8F D9 1A 97 AA 8F F3 6A CE 5A 42 ..sES.......j.ZB0050: D8 D0 F2 BE 6F D5 0A F3 E6 B6 0B 99 50 02 21 00 ....o.......P.!.0060: 8E B7 42 6C E4 1F 05 B2 8A 28 89 7B AF 99 7B B9 ..Bl.....(......0070: DF A2 DD 6A 34 A4 E0 D5 D7 8A A5 58 30 98 11 2C ...j4......X0..,0080: 00 76 00 DB 74 AF EE CB 29 EC B1 FE CA 3E 71 6D .v..t...)....>qm0090: 2C E5 B9 AA BB 36 F7 84 71 83 C7 5D 9D 4F 37 B6 ,....6..q..].O7.00A0: 1F BF 64 00 00 01 64 FD 6B AF 66 00 00 04 03 00 ..d...d.k.f.....00B0: 47 30 45 02 21 00 F8 D0 23 39 A6 A0 26 34 61 5D G0E.!...#9..&4a]00C0: EB 33 47 22 6C C9 37 20 5F EC F4 71 6D F6 02 A1 .3G"l.7 _..qm...00D0: A9 7F 4E 6C DD C1 02 20 2C CD 4B 39 7A FF 6C 32 ..Nl... ,.K9z.l200E0: 5A 71 8C 4F 43 E9 4F 46 6A 9F A9 28 FA 16 D8 D6 Zq.OC.OFj..(....00F0: 03 1E 1C CB BC 6D E9 21 .....m.![2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca.com/cPanelIncCertificationAuthority.crt, accessMethod: ocsp accessLocation:

HTTPS Packets

Copyright Joe Security LLC 2018 Page 26 of 51

Page 27: Automated Malware Analysis Report for https ...

URIName: http://ocsp.comodoca.com]][3]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: 7E 03 5A 65 41 6B A7 7E 0A E1 B8 9D 08 EA 1D 8E ..ZeAk..........0010: 1D 6A C7 65 .j.e]][4]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:false PathLen: undefined][5]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl]]][6]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.2.52][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1D 68 74 74 70 73 3A 2F 2F 73 65 63 75 72 65 ..https://secure0010: 2E 63 6F 6D 6F 64 6F 2E 63 6F 6D 2F 43 50 53 .comodo.com/CPS]] ] [CertificatePolicyId: [2.23.140.1.2.1][] ]][7]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][8]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_Encipherment][9]: ObjectId: 2.5.29.17 Criticality=falseSubjectAlternativeName [ DNSName: classskincare.com DNSName: cpanel.classskincare.com DNSName: mail.classskincare.com DNSName: webdisk.classskincare.com DNSName: webmail.classskincare.com DNSName: www.classskincare.com][10]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 3A 96 46 84 28 1E 6B 14 80 29 DC DC E6 7E 6D 98 :.F.(.k..)....m.0010: 8B 7F 2E 21 ...!]]] Algorithm: [SHA256withRSA] Signature:0000: 43 30 00 E9 55 21 78 BE 8F 49 60 C2 5A CF 63 9A C0..U!x..I`.Z.c.0010: EA 19 CA D9 D8 7F FA 78 CF D2 9B 18 9F C5 E5 0C .......x........0020: E7 B9 8D 1B 99 77 E4 3D 72 78 6F 97 03 6A BE 6D .....w.=rxo..j.m0030: 4C 13 09 91 51 AB 1A 10 07 77 BF 15 6B 74 00 BB L...Q....w..kt..0040: D1 26 8A 5A 1F 2A 87 7B 71 96 B5 BF B3 97 E5 71 .&.Z.*..q......q0050: 6E AD CF FB B9 77 2E D5 50 FD AD 8C B5 EB 7E 9E n....w..P.......0060: 23 DD 7A 4C 06 A4 3D 34 F4 B9 C6 07 AB 94 BC 55 #.zL..=4.......U0070: 6E 8A 89 F0 13 C1 56 44 29 D1 B3 51 89 5E 5B 85 n.....VD)..Q.^[.0080: 82 04 92 4A 10 6B A8 66 17 F6 53 0F D3 F5 60 0C ...J.k.f..S...`.0090: D1 CA 1C C6 D6 A0 80 BD 1E 09 8A AC 44 22 DE 0D ............D"..00A0: CB 09 BC 9B A0 3E B1 F9 15 30 44 49 32 0B 0B 2E .....>...0DI2...00B0: 6F 9A 21 C9 36 5E CD 11 4D EE E2 43 DB FA AD A8 o.!.6^..M..C....00C0: 6F 6B 05 33 5D 08 22 92 0E 5B CA 92 EC CC 00 D5 ok.3]."..[......00D0: 9E 77 0C 3A FB EF B3 F7 C0 01 28 69 AC B0 DF 1B .w.:......(i....00E0: C8 56 56 7E 8B 08 BF E0 E4 B9 52 A3 E5 A5 41 90 .VV.......R...A.00F0: 68 AE F7 FA 01 EC 31 22 B6 CC 42 B5 9D BF BA 33 h.....1"..B....3]

Sep 12, 2018 03:12:10.477510929 CEST

443 49165 104.219.251.196 192.168.2.2 CN=firozenterprise.com CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US

Tue Aug 28 02:00:00 CEST 2018

Tue Nov 27 00:59:59 CET 2018

[[ Version: V3 Subject: CN=firozenterprise.com Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 23687361970482558774915317005750144818311628017821818068198899263279165624737869278426479381786447865449799596279873054104931517578895030547730514553989100153796507744265358180846348389163021766652942085437296892783787713160444348683823112929594042230044262250567798587833320987971363966060466116331185759045106498728101193440200884200788398274280544475492501951703941212893977949486406214372840180016134553962027421630048008584568419442722946863075202734616834382932529121091248957795174551951703277249522481131691603705168631141200768852160211810345246983754903067684260637171864062064742214473336735618360584432431 public exponent: 65537 Validity: [From: Tue Aug 28 02:00:00 CEST 2018, To: Tue Nov 27 00:59:59 CET 2018] Issuer: CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US SerialNumber: [ 76c57b88 1a495509 20ac379a 55f59e72]Certificate Extensions: 10[1]: ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=falseExtension unknown: DER encoded OCTET string =0000: 04 81 F5 04 81 F2 00 F0 00 76 00 EE 4B BD B7 75 .........v..K..u0010: CE 60 BA E1 42 69 1F AB E1 9E 66 A3 0F 7E 5F B0 .`..Bi....f..._.0020: 72 D8 83 00 C4 7B 89 7A A8 FD CB 00 00 01 65 80 r......z......e.0030: 32 10 7B 00 00 04 03 00 47 30 45 02 21 00 F6 32 2.......G0E.!..20040: 59 D5 64 4E 38 45 09 CB 27 8A

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 27 of 51

Page 28: Automated Malware Analysis Report for https ...

77 62 59 C4 28 D0 Y.dN8E..'.wbY.(.0050: FC 40 A7 66 9A AB 6C F5 28 C5 06 4C 38 23 02 20 [email protected].(..L8#. 0060: 11 C4 7C BC 73 5A F4 3C 53 9F 18 F8 7A B9 E1 A1 ....sZ.<S...z...0070: E0 20 33 5E 30 C1 86 0D AB 27 3F C2 92 E8 E2 98 . 3^0....'?.....0080: 00 76 00 DB 74 AF EE CB 29 EC B1 FE CA 3E 71 6D .v..t...)....>qm0090: 2C E5 B9 AA BB 36 F7 84 71 83 C7 5D 9D 4F 37 B6 ,....6..q..].O7.00A0: 1F BF 64 00 00 01 65 80 32 10 B2 00 00 04 03 00 ..d...e.2.......00B0: 47 30 45 02 21 00 DD 77 DA 00 51 C5 18 8C ED EC G0E.!..w..Q.....00C0: 3D AA F4 B6 06 48 6A B7 54 87 97 E0 4A CA D0 16 =....Hj.T...J...00D0: 3C 92 40 1C 24 0D 02 20 04 03 60 76 B8 86 62 C3 <.@.$.. ..`v..b.00E0: BC 63 5C 47 56 4E 87 D1 F3 59 5C 3B 95 29 21 36 .c\GVN...Y\;.)!600F0: F4 84 0C BD 64 FD DC 7E ....d...[2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca.com/cPanelIncCertificationAuthority.crt, accessMethod: ocsp accessLocation: URIName: http://ocsp.comodoca.com]][3]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: 7E 03 5A 65 41 6B A7 7E 0A E1 B8 9D 08 EA 1D 8E ..ZeAk..........0010: 1D 6A C7 65 .j.e]][4]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:false PathLen: undefined][5]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl]]][6]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.2.52][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1D 68 74 74 70 73 3A 2F 2F 73 65 63 75 72 65 ..https://secure0010: 2E 63 6F 6D 6F 64 6F 2E 63 6F 6D 2F 43 50 53 .comodo.com/CPS]] ] [CertificatePolicyId: [2.23.140.1.2.1][] ]][7]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][8]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_Encipherment][9]: ObjectId: 2.5.29.17 Criticality=falseSubjectAlternativeName [ DNSName: firozenterprise.com DNSName: cpanel.firozenterprise.com DNSName: mail.firozenterprise.com DNSName: webdisk.firozenterprise.com DNSName: webmail.firozenterprise.com DNSName: www.firozenterprise.com][10]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 18 1B 8E CB D0 F2 A5 59 6F 4A 73 0B 13 FA C6 2B .......YoJs....+0010: B5 28 AA 38 .(.8]]] Algorithm: [SHA256withRSA] Signature:0000: 17 71 99 C5 8A C6 42 A8 99 A9 58 FB E2 E4 A5 DF .q....B...X.....0010: 6B D4 90 A4 FD 63 69 A1 97 40 39 EF 30 F2 79 AB [email protected]: 7B 5E FE 23 30 88 AA 7B 40 DF 0E 92 EA 4E 97 75 .^.#[email protected]: A2 D6 22 6B F6 75 6D 1F 8A 74 DA 0C 3E FE 1F A3 .."k.um..t..>...0040: BD 75 96 DB FA B7 05 38 C4 AB 50 35 E8 B9 03 25 .u.....8..P5...%0050: B7 1D DE 3F 59 F3 DC 26 9F 50 2E 6B FE 9A 3A E8 ...?Y..&.P.k..:.0060: F0 4F A8 D8 81 66 54 99 EA 96 33 36 69 DA 05 9B .O...fT...36i...0070: BF 17 1B 81 56 BC 4A 03 1A 72 C7 3C 62 60 28 D2 ....V.J..r.<b`(.0080: D9 8F 4A 61 4C C4 1B 2E 27 79 F4 C9 56 A5 57 E3 ..JaL...'y..V.W.0090: EF 5C C8 E5 32 C3 9E 8B E1 2F E3 40 86 32 53 1E .\..2..../[email protected]: 6F 05 BC 73 42 0D E3 55 2A 79 ED 4E A7 80 E8 41 o..sB..U*y.N...A00B0: BB C4 59 71 E0 F5 B5 B6 B2 25 E5 EB 6C 81 29 CA ..Yq.....%..l.).00C0: 7A 86 25 C1 1C FC E7 10 B6 AE 8E C8 8D 75 36 9C z.%..........u6.00D0: 41 03 A4 5C 08 92 7B 61 0B F0 9C CE BD 9E 73 A5 A..\...a......s.00E0: D1 B1 C4 06 32 9E B0 CD 87 60 CC 9E 8B 26 65 85 ....2....`...&e.00F0: 06 00 C8 B7 C4 AA 5E BC 4B A2 3E 54 54 AB 10 3F ......^.K.>TT..?]

Sep 12, 2018 03:12:10.477510929 CEST

443 49165 104.219.251.196 192.168.2.2 CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US

CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

Mon May 18 02:00:00 CEST 2015

Sun May 18 01:59:59 CEST 2025

[[ Version: V3 Subject: CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US Signature Algorithm: SHA384withRSA, OID = 1.2.840.113549.1.1.12 Key: Sun RSA public key, 2048 bits modulus: 1759348009669271301847589579272407567294615345828656319957162846255519821140035372923467888893304007424574303134411067695022560242423974427558020303238825318364196911541424681422123505391288635765073043831821921750880101

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 28 of 51

Page 29: Automated Malware Analysis Report for https ...

0315710974463129067389616293028896205864799170095066829527213637069580537424209085616377394665471565050487092639050216078240279738840070252322854082656970094321515205244683618000265664081313419509307371923479181139989769749253107567251365335361691390702907845356758548602034458245938667693881170016372773160251025347753244451417413595842348278925917111831860996925937874910597825547509003460806507 public exponent: 65537 Validity: [From: Mon May 18 02:00:00 CEST 2015, To: Sun May 18 01:59:59 CEST 2025] Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB SerialNumber: [ f01d4bee 7b7ca37b 3c0566ac 05972458]Certificate Extensions: 8[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca.com/COMODORSAAddTrustCA.crt, accessMethod: ocsp accessLocation: URIName: http://ocsp.comodoca.com]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: BB AF 7E 02 3D FA A6 F1 3C 84 8E AD EE 38 98 EC ....=...<....8..0010: D9 32 32 D4 .22.]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:0][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/COMODORSACertificationAuthority.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.2.52][] ] [CertificatePolicyId: [2.23.140.1.2.1][] ]][6]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][7]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][8]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 7E 03 5A 65 41 6B A7 7E 0A E1 B8 9D 08 EA 1D 8E ..ZeAk..........0010: 1D 6A C7 65 .j.e]]] Algorithm: [SHA384withRSA] Signature:0000: 10 9F A0 60 08 81 74 A1 A0 84 78 60 4C 39 39 DA ...`..t...x`L99.0010: 64 77 EF 19 0A 72 39 23 94 3B 91 7D 7F 34 8B 97 dw...r9#.;...4..0020: 58 4E 59 0A 2D 68 C3 10 42 B0 A0 7A 81 8C 7B AB XNY.-h..B..z....0030: 31 32 20 39 E4 22 73 E0 DE C9 17 5D 83 C5 75 2D 12 9."s....]..u-0040: E1 11 47 59 01 9E 5D C0 F4 DD 12 6A D0 6D 30 20 ..GY..]....j.m0 0050: E8 B3 CA 4F DF 9A E0 A7 17 9F 1A 2F 87 7E EB 50 ...O......./...P0060: E1 53 F3 F8 47 D9 8C 60 F2 C9 65 65 9C F0 DA 01 .S..G..`..ee....0070: E6 B2 F2 D8 07 98 87 DF 37 89 98 55 12 42 C9 E4 ........7..U.B..0080: 2D DE 2D BE AA 64 94 4E D9 2E E6 C2 D5 F2 C0 E6 -.-..d.N........0090: E9 EA 19 3E 37 0B 89 5F C9 3A F8 4F 47 40 3E AF ...>7.._.:.OG@>.00A0: 1A 7F A2 F6 85 01 88 17 36 B5 23 EA B9 FE BA 6B ........6.#....k00B0: 48 0B 02 20 39 AE C3 61 EB 95 A5 A1 73 C7 1C 5F H.. 9..a....s.._00C0: 54 33 73 57 4B 36 8B 9B 5B 28 E3 3E B1 0B 78 5C T3sWK6..[(.>..x\00D0: 6B 14 A7 10 CC E5 DA 3F BA E9 D6 B2 2D 1D 70 54 k......?....-.pT00E0: BA 5E AB 7D 4F 29 89 10 E0 3A 90 04 C5 EE B9 8E .^..O)...:......00F0: 43 A2 E3 63 58 7F 49 8B 71 3E 57 62 23 40 D1 5D C..cX.I.q>Wb#@.]0100: 96 64 22 61 56 9F 96 67 47 87 BC E5 00 20 A4 68 .d"aV..gG.... .h0110: E2 C1 A0 81 7B 68 73 08 C4 6D 4E 70 79 E8 DD 55 .....hs..mNpy..U0120: D7 09 5C B9 9D 0A 95 A6 0C D9 DB E2 8A 55 EB B9 ..\..........U..0130: E1 E7 9A 95 14 4C 58 06 41 C1 10 AA AA B1 3A E2 .....LX.A.....:.0140: A5 4A 4A E0 D9 C9 1F C2 A0 97 BB 06 EF 19 00 DB .JJ.............0150: 02 BE 96 F1 FB 54 8F 93 9A FA 30 22 36 A9 77 26 .....T....0"6.w&0160: 1F 94 28 93 E9 13 3D 45 D1 3A 35 48 1E 98 0D 82 ..(...=E.:5H....0170: 70 C0 0B 5A 28 87 A1 78 51 3F B5 A7 5C A6 91 22 p..Z(..xQ?..\.."0180: 00 42 4C B9 80 15 80 2A B1 2D 89 4F F7 BA 1E 18 .BL....*.-.O....0190: C4 8C 59 1E 73 49 A3 A8 7B BC 1F F7 56 4D 50 9F ..Y.sI......VMP.01A0: 67 16 A7 C7 17 48 E7 6D 54 57 76 6E 97 58 5B 78 g....H.mTWvn.X[x01B0: 64 A4 ED 62 B4 00 3B 06 7E 79 B8 58 5F 6E 84 D6 d..b..;..y.X_n..01C0: 43 BC 4F DB 39 AA 28 F0 C1 89 09 C5 FB E3 18 44 C.O.9.(........D01D0: B7 E5 B2 8B 5D 95 F9 23 5A 0B 72 F7 69 3A D6 57 ....]..#Z.r.i:.W01E0: 8B E1 E9 F4 60 BE C4 51 2B 11 AC FE 48 B3 72 73 ....`..Q+...H.rs01F0: CA 13 50 73 0D 04 76 CA 01 E1 42 C2 D7 21 CF F9 ..Ps..v...B..!..]

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 29 of 51

Page 30: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:10.477510929 CEST

443 49165 104.219.251.196 192.168.2.2 CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE

Tue May 30 12:48:38 CEST 2000

Sat May 30 12:48:38 CEST 2020

[[ Version: V3 Subject: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Signature Algorithm: SHA384withRSA, OID = 1.2.840.113549.1.1.12 Key: Sun RSA public key, 4096 bits modulus: 595250832037245141724642107398533641144111340640849154810839512193646804439589382557795096048235159392412856809181253983148280442751106836828767077478502910675291715965426418324395462826337195608826159904332409833532414343087397304684051488024083060971973988667565926401713702437407307790551210783180012029671811979458976709742365579736599681150756374332129237698142054260771585540729412505699671993111094681722253786369180597052805125225748672266569013967025850135765598233721214965171040686884703517711864518647963618102322884373894861238464186441528415873877499307554355231373646804211013770034465627350166153734933786011622475019872581027516832913754790596939102532587063612068091625752995700206528059096165261547017202283116886060219954285939324476288744352486373249118864714420341870384243932900936553074796547571643358129426474424573956572670213304441994994142333208766235762328926816055054634905252931414737971249889745696283503174642385591131856834241724878687870772321902051261453524679758731747154638983677185705464969589189761598154153383380395065347776922242683529305823609958629983678843126221186204478003285765580771286537570893899006127941280337699169761047271395591258462580922460487748761665926731923248227868312659 public exponent: 65537 Validity: [From: Tue May 30 12:48:38 CEST 2000, To: Sat May 30 12:48:38 CEST 2020] Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE SerialNumber: [ 2766ee56 eb49f38e abd770a2 fc84de22]Certificate Extensions: 7[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.usertrust.com]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0 ...z4.&...&T....0010: 24 CB 54 1A $.T.]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:2147483647][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.usertrust.com/AddTrustExternalCARoot.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0][] ]][6]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][7]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: BB AF 7E 02 3D FA A6 F1 3C 84 8E AD EE 38 98 EC ....=...<....8..0010: D9 32 32 D4 .22.]]] Algorithm: [SHA384withRSA] Signature:0000: 64 BF 83 F1 5F 9A 85 D0 CD B8 A1 29 57 0D E8 5A d..._......)W..Z0010: F7 D1 E9 3E F2 76 04 6E F1 52 70 BB 1E 3C FF 4D ...>.v.n.Rp..<.M0020: 0D 74 6A CC 81 82 25 D3 C3 A0 2A 5D 4C F5 BA 8B .tj...%...*]L...0030: A1 6D C4 54 09 75 C7 E3 27 0E 5D 84 79 37 40 13 .m.T.u..'.][email protected]: 77 F5 B4 AC 1C D0 3B AB 17 12 D6 EF 34 18 7E 2B w.....;.....4..+0050: E9 79 D3 AB 57 45 0C AF 28 FA D0 DB E5 50 95 88 .y..WE..(....P..0060: BB DF 85 57 69 7D 92 D8 52 CA 73 81 BF 1C F3 E6 ...Wi...R.s.....0070: B8 6E 66 11 05 B3 1E 94 2D 7F 91 95 92 59 F1 4C .nf.....-....Y.L0080: CE A3 91 71 4C 7C 47 0C 3B 0B 19 F6 A1 B1 6C 86 ...qL.G.;.....l.0090: 3E 5C AA C4 2E 82 CB F9 07 96 BA 48 4D 90 F2 94 >\.........HM...00A0: C8 A9 73 A2 EB 06 7B 23 9D DE A2 F3 4D 55 9F 7A ..s....#....MU.z00B0: 61 45 98 18 68 C7 5E 40 6B 23 F5 79 7A EF 8C B5 aE..h.^@k#.yz...00C0: 6B 8B B7 6F 46 F4 7B F1 3D 4B 04 D8 93 80 59 5A k..oF...=K....YZ00D0: E0 41 24 1D B2 8F 15 60 58 47 DB EF 6E 46 FD 15 .A$....`XG..nF..00E0: F5 D9 5F 9A B3 DB D8 B8 E4 40 B3 CD 97 39 AE 85 [email protected]: BB 1D 8E BC DC 87 9B D1 A6 EF F1 3B 6F 10 38 6F ...........;o.8o]

Sep 12, 2018 03:12:10.477828026

443 49166 104.219.251.196 192.168.2.2 CN=firozenterprise.com CN="cPanel, Inc. Certification

Tue Aug 28

Tue Nov 27

[[ Version: V3 Subject: CN=firozenterprise.com Signature Algorithm: SHA256withRSA, OID =

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 30 of 51

Page 31: Automated Malware Analysis Report for https ...

CEST Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US

02:00:00 CEST 2018

00:59:59 CET 2018

1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 23687361970482558774915317005750144818311628017821818068198899263279165624737869278426479381786447865449799596279873054104931517578895030547730514553989100153796507744265358180846348389163021766652942085437296892783787713160444348683823112929594042230044262250567798587833320987971363966060466116331185759045106498728101193440200884200788398274280544475492501951703941212893977949486406214372840180016134553962027421630048008584568419442722946863075202734616834382932529121091248957795174551951703277249522481131691603705168631141200768852160211810345246983754903067684260637171864062064742214473336735618360584432431 public exponent: 65537 Validity: [From: Tue Aug 28 02:00:00 CEST 2018, To: Tue Nov 27 00:59:59 CET 2018] Issuer: CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US SerialNumber: [ 76c57b88 1a495509 20ac379a 55f59e72]Certificate Extensions: 10[1]: ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=falseExtension unknown: DER encoded OCTET string =0000: 04 81 F5 04 81 F2 00 F0 00 76 00 EE 4B BD B7 75 .........v..K..u0010: CE 60 BA E1 42 69 1F AB E1 9E 66 A3 0F 7E 5F B0 .`..Bi....f..._.0020: 72 D8 83 00 C4 7B 89 7A A8 FD CB 00 00 01 65 80 r......z......e.0030: 32 10 7B 00 00 04 03 00 47 30 45 02 21 00 F6 32 2.......G0E.!..20040: 59 D5 64 4E 38 45 09 CB 27 8A 77 62 59 C4 28 D0 Y.dN8E..'.wbY.(.0050: FC 40 A7 66 9A AB 6C F5 28 C5 06 4C 38 23 02 20 [email protected].(..L8#. 0060: 11 C4 7C BC 73 5A F4 3C 53 9F 18 F8 7A B9 E1 A1 ....sZ.<S...z...0070: E0 20 33 5E 30 C1 86 0D AB 27 3F C2 92 E8 E2 98 . 3^0....'?.....0080: 00 76 00 DB 74 AF EE CB 29 EC B1 FE CA 3E 71 6D .v..t...)....>qm0090: 2C E5 B9 AA BB 36 F7 84 71 83 C7 5D 9D 4F 37 B6 ,....6..q..].O7.00A0: 1F BF 64 00 00 01 65 80 32 10 B2 00 00 04 03 00 ..d...e.2.......00B0: 47 30 45 02 21 00 DD 77 DA 00 51 C5 18 8C ED EC G0E.!..w..Q.....00C0: 3D AA F4 B6 06 48 6A B7 54 87 97 E0 4A CA D0 16 =....Hj.T...J...00D0: 3C 92 40 1C 24 0D 02 20 04 03 60 76 B8 86 62 C3 <.@.$.. ..`v..b.00E0: BC 63 5C 47 56 4E 87 D1 F3 59 5C 3B 95 29 21 36 .c\GVN...Y\;.)!600F0: F4 84 0C BD 64 FD DC 7E ....d...[2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca.com/cPanelIncCertificationAuthority.crt, accessMethod: ocsp accessLocation: URIName: http://ocsp.comodoca.com]][3]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: 7E 03 5A 65 41 6B A7 7E 0A E1 B8 9D 08 EA 1D 8E ..ZeAk..........0010: 1D 6A C7 65 .j.e]][4]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:false PathLen: undefined][5]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl]]][6]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.2.52][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1D 68 74 74 70 73 3A 2F 2F 73 65 63 75 72 65 ..https://secure0010: 2E 63 6F 6D 6F 64 6F 2E 63 6F 6D 2F 43 50 53 .comodo.com/CPS]] ] [CertificatePolicyId: [2.23.140.1.2.1][] ]][7]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][8]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_Encipherment][9]: ObjectId: 2.5.29.17 Criticality=falseSubjectAlternativeName [ DNSName: firozenterprise.com DNSName: cpanel.firozenterprise.com DNSName: mail.firozenterprise.com DNSName: webdisk.firozenterprise.com DNSName: webmail.firozenterprise.com DNSName: www.firozenterprise.com][10]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 18 1B 8E CB D0 F2 A5 59 6F 4A 73 0B 13 FA C6 2B .......YoJs....+0010: B5 28 AA 38 .(.8]]] Algorithm: [SHA256withRSA] Signature:0000: 17 71 99 C5 8A C6 42 A8 99 A9 58 FB E2 E4 A5 DF .q....B...X.....0010: 6B D4 90 A4 FD 63 69 A1 97 40 39 EF 30 F2 79 AB [email protected]: 7B 5E FE 23

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 31 of 51

Page 32: Automated Malware Analysis Report for https ...

30 88 AA 7B 40 DF 0E 92 EA 4E 97 75 .^.#[email protected]: A2 D6 22 6B F6 75 6D 1F 8A 74 DA 0C 3E FE 1F A3 .."k.um..t..>...0040: BD 75 96 DB FA B7 05 38 C4 AB 50 35 E8 B9 03 25 .u.....8..P5...%0050: B7 1D DE 3F 59 F3 DC 26 9F 50 2E 6B FE 9A 3A E8 ...?Y..&.P.k..:.0060: F0 4F A8 D8 81 66 54 99 EA 96 33 36 69 DA 05 9B .O...fT...36i...0070: BF 17 1B 81 56 BC 4A 03 1A 72 C7 3C 62 60 28 D2 ....V.J..r.<b`(.0080: D9 8F 4A 61 4C C4 1B 2E 27 79 F4 C9 56 A5 57 E3 ..JaL...'y..V.W.0090: EF 5C C8 E5 32 C3 9E 8B E1 2F E3 40 86 32 53 1E .\..2..../[email protected]: 6F 05 BC 73 42 0D E3 55 2A 79 ED 4E A7 80 E8 41 o..sB..U*y.N...A00B0: BB C4 59 71 E0 F5 B5 B6 B2 25 E5 EB 6C 81 29 CA ..Yq.....%..l.).00C0: 7A 86 25 C1 1C FC E7 10 B6 AE 8E C8 8D 75 36 9C z.%..........u6.00D0: 41 03 A4 5C 08 92 7B 61 0B F0 9C CE BD 9E 73 A5 A..\...a......s.00E0: D1 B1 C4 06 32 9E B0 CD 87 60 CC 9E 8B 26 65 85 ....2....`...&e.00F0: 06 00 C8 B7 C4 AA 5E BC 4B A2 3E 54 54 AB 10 3F ......^.K.>TT..?]

Sep 12, 2018 03:12:10.477828026 CEST

443 49166 104.219.251.196 192.168.2.2 CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US

CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

Mon May 18 02:00:00 CEST 2015

Sun May 18 01:59:59 CEST 2025

[[ Version: V3 Subject: CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US Signature Algorithm: SHA384withRSA, OID = 1.2.840.113549.1.1.12 Key: Sun RSA public key, 2048 bits modulus: 17593480096692713018475895792724075672946153458286563199571628462555198211400353729234678888933040074245743031344110676950225602424239744275580203032388253183641969115414246814221235053912886357650730438318219217508801010315710974463129067389616293028896205864799170095066829527213637069580537424209085616377394665471565050487092639050216078240279738840070252322854082656970094321515205244683618000265664081313419509307371923479181139989769749253107567251365335361691390702907845356758548602034458245938667693881170016372773160251025347753244451417413595842348278925917111831860996925937874910597825547509003460806507 public exponent: 65537 Validity: [From: Mon May 18 02:00:00 CEST 2015, To: Sun May 18 01:59:59 CEST 2025] Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB SerialNumber: [ f01d4bee 7b7ca37b 3c0566ac 05972458]Certificate Extensions: 8[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca.com/COMODORSAAddTrustCA.crt, accessMethod: ocsp accessLocation: URIName: http://ocsp.comodoca.com]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: BB AF 7E 02 3D FA A6 F1 3C 84 8E AD EE 38 98 EC ....=...<....8..0010: D9 32 32 D4 .22.]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:0][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/COMODORSACertificationAuthority.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.2.52][] ] [CertificatePolicyId: [2.23.140.1.2.1][] ]][6]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][7]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][8]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 7E 03 5A 65 41 6B A7 7E 0A E1 B8 9D 08 EA 1D 8E ..ZeAk..........0010: 1D 6A C7 65 .j.e]]] Algorithm: [SHA384withRSA] Signature:0000: 10 9F A0 60 08 81 74 A1 A0 84 78 60 4C 39 39 DA ...`..t...x`L99.0010: 64 77 EF 19 0A 72 39 23 94 3B 91 7D 7F 34 8B 97 dw...r9#.;...4..0020: 58 4E 59 0A 2D 68 C3 10 42 B0 A0 7A 81 8C 7B AB XNY.-h..B..z....0030: 31 32 20 39 E4 22 73 E0 DE C9 17 5D 83 C5 75 2D 12 9."s....]..u-0040: E1 11 47 59 01 9E 5D C0 F4 DD 12 6A D0 6D 30 20 ..GY..]....j.m0 0050: E8 B3 CA 4F DF 9A E0 A7 17 9F 1A 2F 87 7E EB 50 ...O......./...P0060: E1 53 F3 F8 47 D9 8C 60 F2 C9 65 65 9C F0 DA 01 .S..G..`..ee....0070: E6 B2 F2 D8 07 98 87 DF 37 89 98 55 12 42 C9 E4 ........7..U.B..0080: 2D DE 2D BE AA 64 94 4E D9 2E E6 C2 D5 F2 C0 E6 -.-..d.N........0090: E9 EA 19 3E 37 0B 89 5F C9 3A F8 4F 47 40 3E AF ...>7.._.:.OG@>.00A0: 1A 7F A2 F6 85 01 88 17 36 B5 23 EA B9 FE BA 6B ........6.#....k00B0: 48 0B 02 20 39 AE C3 61 EB 95 A5 A1 73 C7 1C 5F H..

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 32 of 51

Page 33: Automated Malware Analysis Report for https ...

9..a....s.._00C0: 54 33 73 57 4B 36 8B 9B 5B 28 E3 3E B1 0B 78 5C T3sWK6..[(.>..x\00D0: 6B 14 A7 10 CC E5 DA 3F BA E9 D6 B2 2D 1D 70 54 k......?....-.pT00E0: BA 5E AB 7D 4F 29 89 10 E0 3A 90 04 C5 EE B9 8E .^..O)...:......00F0: 43 A2 E3 63 58 7F 49 8B 71 3E 57 62 23 40 D1 5D C..cX.I.q>Wb#@.]0100: 96 64 22 61 56 9F 96 67 47 87 BC E5 00 20 A4 68 .d"aV..gG.... .h0110: E2 C1 A0 81 7B 68 73 08 C4 6D 4E 70 79 E8 DD 55 .....hs..mNpy..U0120: D7 09 5C B9 9D 0A 95 A6 0C D9 DB E2 8A 55 EB B9 ..\..........U..0130: E1 E7 9A 95 14 4C 58 06 41 C1 10 AA AA B1 3A E2 .....LX.A.....:.0140: A5 4A 4A E0 D9 C9 1F C2 A0 97 BB 06 EF 19 00 DB .JJ.............0150: 02 BE 96 F1 FB 54 8F 93 9A FA 30 22 36 A9 77 26 .....T....0"6.w&0160: 1F 94 28 93 E9 13 3D 45 D1 3A 35 48 1E 98 0D 82 ..(...=E.:5H....0170: 70 C0 0B 5A 28 87 A1 78 51 3F B5 A7 5C A6 91 22 p..Z(..xQ?..\.."0180: 00 42 4C B9 80 15 80 2A B1 2D 89 4F F7 BA 1E 18 .BL....*.-.O....0190: C4 8C 59 1E 73 49 A3 A8 7B BC 1F F7 56 4D 50 9F ..Y.sI......VMP.01A0: 67 16 A7 C7 17 48 E7 6D 54 57 76 6E 97 58 5B 78 g....H.mTWvn.X[x01B0: 64 A4 ED 62 B4 00 3B 06 7E 79 B8 58 5F 6E 84 D6 d..b..;..y.X_n..01C0: 43 BC 4F DB 39 AA 28 F0 C1 89 09 C5 FB E3 18 44 C.O.9.(........D01D0: B7 E5 B2 8B 5D 95 F9 23 5A 0B 72 F7 69 3A D6 57 ....]..#Z.r.i:.W01E0: 8B E1 E9 F4 60 BE C4 51 2B 11 AC FE 48 B3 72 73 ....`..Q+...H.rs01F0: CA 13 50 73 0D 04 76 CA 01 E1 42 C2 D7 21 CF F9 ..Ps..v...B..!..]

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 33 of 51

Page 34: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:10.477828026 CEST

443 49166 104.219.251.196 192.168.2.2 CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE

Tue May 30 12:48:38 CEST 2000

Sat May 30 12:48:38 CEST 2020

[[ Version: V3 Subject: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Signature Algorithm: SHA384withRSA, OID = 1.2.840.113549.1.1.12 Key: Sun RSA public key, 4096 bits modulus: 595250832037245141724642107398533641144111340640849154810839512193646804439589382557795096048235159392412856809181253983148280442751106836828767077478502910675291715965426418324395462826337195608826159904332409833532414343087397304684051488024083060971973988667565926401713702437407307790551210783180012029671811979458976709742365579736599681150756374332129237698142054260771585540729412505699671993111094681722253786369180597052805125225748672266569013967025850135765598233721214965171040686884703517711864518647963618102322884373894861238464186441528415873877499307554355231373646804211013770034465627350166153734933786011622475019872581027516832913754790596939102532587063612068091625752995700206528059096165261547017202283116886060219954285939324476288744352486373249118864714420341870384243932900936553074796547571643358129426474424573956572670213304441994994142333208766235762328926816055054634905252931414737971249889745696283503174642385591131856834241724878687870772321902051261453524679758731747154638983677185705464969589189761598154153383380395065347776922242683529305823609958629983678843126221186204478003285765580771286537570893899006127941280337699169761047271395591258462580922460487748761665926731923248227868312659 public exponent: 65537 Validity: [From: Tue May 30 12:48:38 CEST 2000, To: Sat May 30 12:48:38 CEST 2020] Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE SerialNumber: [ 2766ee56 eb49f38e abd770a2 fc84de22]Certificate Extensions: 7[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.usertrust.com]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0 ...z4.&...&T....0010: 24 CB 54 1A $.T.]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:2147483647][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.usertrust.com/AddTrustExternalCARoot.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0][] ]][6]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][7]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: BB AF 7E 02 3D FA A6 F1 3C 84 8E AD EE 38 98 EC ....=...<....8..0010: D9 32 32 D4 .22.]]] Algorithm: [SHA384withRSA] Signature:0000: 64 BF 83 F1 5F 9A 85 D0 CD B8 A1 29 57 0D E8 5A d..._......)W..Z0010: F7 D1 E9 3E F2 76 04 6E F1 52 70 BB 1E 3C FF 4D ...>.v.n.Rp..<.M0020: 0D 74 6A CC 81 82 25 D3 C3 A0 2A 5D 4C F5 BA 8B .tj...%...*]L...0030: A1 6D C4 54 09 75 C7 E3 27 0E 5D 84 79 37 40 13 .m.T.u..'.][email protected]: 77 F5 B4 AC 1C D0 3B AB 17 12 D6 EF 34 18 7E 2B w.....;.....4..+0050: E9 79 D3 AB 57 45 0C AF 28 FA D0 DB E5 50 95 88 .y..WE..(....P..0060: BB DF 85 57 69 7D 92 D8 52 CA 73 81 BF 1C F3 E6 ...Wi...R.s.....0070: B8 6E 66 11 05 B3 1E 94 2D 7F 91 95 92 59 F1 4C .nf.....-....Y.L0080: CE A3 91 71 4C 7C 47 0C 3B 0B 19 F6 A1 B1 6C 86 ...qL.G.;.....l.0090: 3E 5C AA C4 2E 82 CB F9 07 96 BA 48 4D 90 F2 94 >\.........HM...00A0: C8 A9 73 A2 EB 06 7B 23 9D DE A2 F3 4D 55 9F 7A ..s....#....MU.z00B0: 61 45 98 18 68 C7 5E 40 6B 23 F5 79 7A EF 8C B5 aE..h.^@k#.yz...00C0: 6B 8B B7 6F 46 F4 7B F1 3D 4B 04 D8 93 80 59 5A k..oF...=K....YZ00D0: E0 41 24 1D B2 8F 15 60 58 47 DB EF 6E 46 FD 15 .A$....`XG..nF..00E0: F5 D9 5F 9A B3 DB D8 B8 E4 40 B3 CD 97 39 AE 85 [email protected]: BB 1D 8E BC DC 87 9B D1 A6 EF F1 3B 6F 10 38 6F ...........;o.8o]

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 34 of 51

Page 35: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:11.191034079 CEST

443 49169 209.197.3.15 192.168.2.2 CN=*.bootstrapcdn.com, OU=Domain Control Validated

CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

Tue Oct 03 02:00:00 CEST 2017

Sun Oct 14 01:59:59 CEST 2018

[[ Version: V3 Subject: CN=*.bootstrapcdn.com, OU=Domain Control Validated Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 23164487293155836928267063313616149426574456296976891850699681745590759534291952232620411128225953276298802771603720920022465825738422565569750500200915580542791231109658171005733239219419632188328381422057807128211444103062452663341063218378600226482621353788132713403943269065220519891220289156691739860033573343876155883008997999464070937424423418951606183689299116679253216622246917717154595164320019267434716455827923952733832630640828966149728321992750866637161370613633680666795198079925191581028498430742067963363326979040883771353774325137829846887487023416784445325579025901655179325941392686641461428752281 public exponent: 65537 Validity: [From: Tue Oct 03 02:00:00 CEST 2017, To: Sun Oct 14 01:59:59 CEST 2018] Issuer: CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB SerialNumber: [ e7758cf6 85eb4d70 126c8cf4 3edd9c54]Certificate Extensions: 9[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca.com/COMODORSADomainValidationSecureServerCA.crt, accessMethod: ocsp accessLocation: URIName: http://ocsp.comodoca.com]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: 90 AF 6A 3A 94 5A 0B D8 90 EA 12 56 73 DF 43 B4 ..j:.Z.....Vs.C.0010: 3A 28 DA E7 :(..]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:false PathLen: undefined][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.2.7][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1D 68 74 74 70 73 3A 2F 2F 73 65 63 75 72 65 ..https://secure0010: 2E 63 6F 6D 6F 64 6F 2E 63 6F 6D 2F 43 50 53 .comodo.com/CPS]] ] [CertificatePolicyId: [2.23.140.1.2.1][] ]][6]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][7]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_Encipherment][8]: ObjectId: 2.5.29.17 Criticality=falseSubjectAlternativeName [ DNSName: *.bootstrapcdn.com DNSName: bootstrapcdn.com][9]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 02 CC 0C F5 DB A4 40 59 11 FB BC 0D B8 9F F0 36 [email protected]: 4B 1F 7F 9D K...]]] Algorithm: [SHA256withRSA] Signature:0000: 52 EE 11 C0 C0 2A 7B 7F EB 23 BF D2 E9 23 A8 E4 R....*...#...#..0010: BA 58 22 A7 03 17 E9 90 98 FC C1 8E 37 1C 37 0F .X".........7.7.0020: 97 07 21 3B 17 B1 93 EF 6B DA F2 20 7E 95 C4 81 ..!;....k.. ....0030: 5B 8F 6B 1B FE 4B DB 94 38 0A DC AF 46 57 A9 9B [.k..K..8...FW..0040: E6 41 66 2C 29 89 49 A4 28 2C 6C B1 B6 ED 68 07 .Af,).I.(,l...h.0050: C2 5C 8B 2B 59 AB 0A 50 F9 06 6C 0A 0E F5 9B D9 .\.+Y..P..l.....0060: C4 49 01 98 2D 56 75 70 91 6C 01 6D 8B B2 3F 17 .I..-Vup.l.m..?.0070: 51 F9 2F 64 32 CF 97 77 78 65 54 4A 2E 72 6D 0C Q./d2..wxeTJ.rm.0080: 8C 56 E0 FA DB F9 36 C5 39 D6 0F 38 EE FC 0C 99 .V....6.9..8....0090: 4F 9B DB 16 08 59 9F E3 EF FA AD 0B 6C 59 AB A0 O....Y......lY..00A0: F8 C3 A4 53 E8 D8 65 53 93 CB 23 CF F7 79 32 38 ...S..eS..#..y2800B0: E4 37 CE 5B 7B B7 69 C4 E0 DF AB E5 53 98 70 B5 .7.[..i.....S.p.00C0: 5E DA 09 3A F0 6A F1 F1 56 71 4C 51 B9 B4 4A 3E ^..:.j..VqLQ..J>00D0: 51 71 9C C6 19 C0 E4 05 AB D6 AF E6 FC 8F 10 FE Qq..............00E0: B8 A6 3F 5D 67 10 BF 58 AA 83 38 97 F5 D2 B9 13 ..?]g..X..8.....00F0: 60 64 38 94 42 43 3F 73 9D 0D 14 7E CC 72 A8 1E `d8.BC?s.....r..]

Sep 12, 2018 03:12:11.191034079 CEST

443 49169 209.197.3.15 192.168.2.2 CN=COMODO RSA Domain Validation Secure Server CA,

CN=COMODO RSA Certification

Wed Feb 12 01:00:00

Mon Feb 12 00:59:59

[[ Version: V3 Subject: CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 35 of 51

Page 36: Automated Malware Analysis Report for https ...

O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

CET 2014

CET 2029

Signature Algorithm: SHA384withRSA, OID = 1.2.840.113549.1.1.12 Key: Sun RSA public key, 2048 bits modulus: 18021508317891126045114383893640587389787314988023771299021472384098480478916503597778296613150634219765052113517870635171403307225477983047468706279013651027886500159485348697094115927961850381525182009137128777951162358715158533528593200093291791323275973789174789209802980910482500744419318360338528025872227868058578212418244189425301367382232973595110901594292490129763308095314503250053957090379265992785603931784956681691284995547158646635183735467516188519673313343149548166538558424521681954529559978463371620234598058977077392872218941503229331579208118464720991080636709101634982701306129953489796945248933 public exponent: 65537 Validity: [From: Wed Feb 12 01:00:00 CET 2014, To: Mon Feb 12 00:59:59 CET 2029] Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB SerialNumber: [ 2b2e6eea d975366c 148a6edb a37c8c07]Certificate Extensions: 8[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca.com/COMODORSAAddTrustCA.crt, accessMethod: ocsp accessLocation: URIName: http://ocsp.comodoca.com]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: BB AF 7E 02 3D FA A6 F1 3C 84 8E AD EE 38 98 EC ....=...<....8..0010: D9 32 32 D4 .22.]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:0][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/COMODORSACertificationAuthority.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0][] ] [CertificatePolicyId: [2.23.140.1.2.1][] ]][6]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][7]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][8]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 90 AF 6A 3A 94 5A 0B D8 90 EA 12 56 73 DF 43 B4 ..j:.Z.....Vs.C.0010: 3A 28 DA E7 :(..]]] Algorithm: [SHA384withRSA] Signature:0000: 4E 2B 76 4F 92 1C 62 36 89 BA 77 C1 27 05 F4 1C N+vO..b6..w.'...0010: D6 44 9D A9 9A 3E AA D5 66 66 01 3E EA 49 E6 A2 .D...>..ff.>.I..0020: 35 BC FA F6 DD 95 8E 99 35 98 0E 36 18 75 B1 DD 5.......5..6.u..0030: DD 50 72 7C AE DC 77 88 CE 0F F7 90 20 CA A3 67 .Pr...w..... ..g0040: 2E 1F 56 7F 7B E1 44 EA 42 95 C4 5D 0D 01 50 46 ..V...D.B..]..PF0050: 15 F2 81 89 59 6C 8A DD 8C F1 12 A1 8D 3A 42 8A ....Yl.......:B.0060: 98 F8 4B 34 7B 27 3B 08 B4 6F 24 3B 72 9D 63 74 ..K4.';..o$;r.ct0070: 58 3C 1A 6C 3F 4F C7 11 9A C8 A8 F5 B5 37 EF 10 X<.l?O.......7..0080: 45 C6 6C D9 E0 5E 95 26 B3 EB AD A3 B9 EE 7F 0C E.l..^.&........0090: 9A 66 35 73 32 60 4E E5 DD 8A 61 2C 6E 52 11 77 .f5s2`N...a,nR.w00A0: 68 96 D3 18 75 51 15 00 1B 74 88 DD E1 C7 38 04 h...uQ...t....8.00B0: 43 28 E9 16 FD D9 05 D4 5D 47 27 60 D6 FB 38 3B C(......]G'`..8;00C0: 6C 72 A2 94 F8 42 1A DF ED 6F 06 8C 45 C2 06 00 lr...B...o..E...00D0: AA E4 E8 DC D9 B5 E1 73 78 EC F6 23 DC D1 DD 6C .......sx..#...l00E0: 8E 1A 8F A5 EA 54 7C 96 B7 C3 FE 55 8E 8D 49 5E .....T.....U..I^00F0: FC 64 BB CF 3E BD 96 EB 69 CD BF E0 48 F1 62 82 .d..>...i...H.b.0100: 10 E5 0C 46 57 F2 33 DA D0 C8 63 ED C6 1F 94 05 ...FW.3...c.....0110: 96 4A 1A 91 D1 F7 EB CF 8F 52 AE 0D 08 D9 3E A8 .J.......R....>.0120: A0 51 E9 C1 87 74 D5 C9 F7 74 AB 2E 53 FB BB 7A .Q...t...t..S..z0130: FB 97 E2 F8 1F 26 8F B3 D2 A0 E0 37 5B 28 3B 31 .....&.....7[(;10140: E5 0E 57 2D 5A B8 AD 79 AC 5E 20 66 1A A5 B9 A6 ..W-Z..y.^ f....0150: B5 39 C1 F5 98 43 FF EE F9 A7 A7 FD EE CA 24 3D .9...C........$=0160: 80 16 C4 17 8F 8A C1 60 A1 0C AE 5B 43 47 91 4B .......`...[CG.K0170: D5 9A 17 5F F9 D4 87 C1 C2 8C B7 E7 E2 0F 30 19 ..._..........0.0180: 37 86 AC E0 DC 42 03 E6 94 A8 9D AE FD 0F 24 51 7....B........$Q0190: 94 CE 92 08 D1 FC 50 F0 03 40 7B 88 59 ED 0E DD [email protected]: AC D2 77 82 34 DC 06 95 02 D8

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 36 of 51

Page 37: Automated Malware Analysis Report for https ...

90 F9 2D EA 37 D5 ..w.4.......-.7.01B0: 1A 60 D0 67 20 D7 D8 42 0B 45 AF 82 68 DE DD 66 .`.g ..B.E..h..f01C0: 24 37 90 29 94 19 46 19 25 B8 80 D7 CB D4 86 28 $7.)..F.%......(01D0: 6A 44 70 26 23 62 A9 9F 86 6F BF BA 90 70 D2 56 jDp&#b...o...p.V01E0: 77 85 78 EF EA 25 A9 17 CE 50 72 8C 00 3A AA E3 w.x..%...Pr..:..01F0: DB 63 34 9F F8 06 71 01 E2 82 20 D4 FE 6F BD B1 .c4...q... ..o..]

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 37 of 51

Page 38: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:11.191034079 CEST

443 49169 209.197.3.15 192.168.2.2 CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE

Tue May 30 12:48:38 CEST 2000

Sat May 30 12:48:38 CEST 2020

[[ Version: V3 Subject: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Signature Algorithm: SHA384withRSA, OID = 1.2.840.113549.1.1.12 Key: Sun RSA public key, 4096 bits modulus: 595250832037245141724642107398533641144111340640849154810839512193646804439589382557795096048235159392412856809181253983148280442751106836828767077478502910675291715965426418324395462826337195608826159904332409833532414343087397304684051488024083060971973988667565926401713702437407307790551210783180012029671811979458976709742365579736599681150756374332129237698142054260771585540729412505699671993111094681722253786369180597052805125225748672266569013967025850135765598233721214965171040686884703517711864518647963618102322884373894861238464186441528415873877499307554355231373646804211013770034465627350166153734933786011622475019872581027516832913754790596939102532587063612068091625752995700206528059096165261547017202283116886060219954285939324476288744352486373249118864714420341870384243932900936553074796547571643358129426474424573956572670213304441994994142333208766235762328926816055054634905252931414737971249889745696283503174642385591131856834241724878687870772321902051261453524679758731747154638983677185705464969589189761598154153383380395065347776922242683529305823609958629983678843126221186204478003285765580771286537570893899006127941280337699169761047271395591258462580922460487748761665926731923248227868312659 public exponent: 65537 Validity: [From: Tue May 30 12:48:38 CEST 2000, To: Sat May 30 12:48:38 CEST 2020] Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE SerialNumber: [ 2766ee56 eb49f38e abd770a2 fc84de22]Certificate Extensions: 7[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.usertrust.com]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0 ...z4.&...&T....0010: 24 CB 54 1A $.T.]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:2147483647][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.usertrust.com/AddTrustExternalCARoot.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0][] ]][6]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][7]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: BB AF 7E 02 3D FA A6 F1 3C 84 8E AD EE 38 98 EC ....=...<....8..0010: D9 32 32 D4 .22.]]] Algorithm: [SHA384withRSA] Signature:0000: 64 BF 83 F1 5F 9A 85 D0 CD B8 A1 29 57 0D E8 5A d..._......)W..Z0010: F7 D1 E9 3E F2 76 04 6E F1 52 70 BB 1E 3C FF 4D ...>.v.n.Rp..<.M0020: 0D 74 6A CC 81 82 25 D3 C3 A0 2A 5D 4C F5 BA 8B .tj...%...*]L...0030: A1 6D C4 54 09 75 C7 E3 27 0E 5D 84 79 37 40 13 .m.T.u..'.][email protected]: 77 F5 B4 AC 1C D0 3B AB 17 12 D6 EF 34 18 7E 2B w.....;.....4..+0050: E9 79 D3 AB 57 45 0C AF 28 FA D0 DB E5 50 95 88 .y..WE..(....P..0060: BB DF 85 57 69 7D 92 D8 52 CA 73 81 BF 1C F3 E6 ...Wi...R.s.....0070: B8 6E 66 11 05 B3 1E 94 2D 7F 91 95 92 59 F1 4C .nf.....-....Y.L0080: CE A3 91 71 4C 7C 47 0C 3B 0B 19 F6 A1 B1 6C 86 ...qL.G.;.....l.0090: 3E 5C AA C4 2E 82 CB F9 07 96 BA 48 4D 90 F2 94 >\.........HM...00A0: C8 A9 73 A2 EB 06 7B 23 9D DE A2 F3 4D 55 9F 7A ..s....#....MU.z00B0: 61 45 98 18 68 C7 5E 40 6B 23 F5 79 7A EF 8C B5 aE..h.^@k#.yz...00C0: 6B 8B B7 6F 46 F4 7B F1 3D 4B 04 D8 93 80 59 5A k..oF...=K....YZ00D0: E0 41 24 1D B2 8F 15 60 58 47 DB EF 6E 46 FD 15 .A$....`XG..nF..00E0: F5 D9 5F 9A B3 DB D8 B8 E4 40 B3 CD 97 39 AE 85 [email protected]: BB 1D 8E BC DC 87 9B D1 A6 EF F1 3B 6F 10 38 6F ...........;o.8o]

Sep 12, 2018 03:12:11.227997065

443 49173 104.19.199.151 192.168.2.2 CN=ssl412106.cloudflaressl.com, OU=PositiveSSL

CN=COMODO ECC Domain

Sat Apr 14

Mon Oct 22

[[ Version: V3 Subject: CN=ssl412106.cloudflaressl.com, OU=PositiveSSL

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 38 of 51

Page 39: Automated Malware Analysis Report for https ...

CEST Multi-Domain, OU=Domain Control Validated

Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

02:00:00 CEST 2018

01:59:59 CEST 2018

Multi-Domain, OU=Domain Control Validated Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 256 bits public x coord: 74670894700651288995954670988429385112865462327974409628320387213825828261382 public y coord: 60255510265998791012803977159444763677424207415514033971733529867964554057914 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) Validity: [From: Sat Apr 14 02:00:00 CEST 2018, To: Mon Oct 22 01:59:59 CEST 2018] Issuer: CN=COMODO ECC Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB SerialNumber: [ f51f2fbd 11af080d d9090a14 958df34d]Certificate Extensions: 10[1]: ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=falseExtension unknown: DER encoded OCTET string =0000: 04 81 F7 04 81 F4 00 F2 00 77 00 EE 4B BD B7 75 .........w..K..u0010: CE 60 BA E1 42 69 1F AB E1 9E 66 A3 0F 7E 5F B0 .`..Bi....f..._.0020: 72 D8 83 00 C4 7B 89 7A A8 FD CB 00 00 01 62 C1 r......z......b.0030: 96 18 5B 00 00 04 03 00 48 30 46 02 21 00 8B 16 ..[.....H0F.!...0040: CC 26 82 7D 9F CA AB B8 5A A1 00 89 7D DC C5 E5 .&......Z.......0050: D8 5C 48 85 C8 3D 59 36 AD 1B 63 DA E0 9C 02 21 .\H..=Y6..c....!0060: 00 AF A7 4B E0 DF 16 75 02 5F CA CB 0E 80 28 9E ...K...u._....(.0070: 6A E2 5B 71 EC 26 25 1A 41 B1 17 89 CA 87 7A 1F j.[q.&%.A.....z.0080: B7 00 77 00 DB 74 AF EE CB 29 EC B1 FE CA 3E 71 ..w..t...)....>q0090: 6D 2C E5 B9 AA BB 36 F7 84 71 83 C7 5D 9D 4F 37 m,....6..q..].O700A0: B6 1F BF 64 00 00 01 62 C1 96 10 00 00 00 04 03 ...d...b........00B0: 00 48 30 46 02 21 00 F2 EF 4A 0A 25 09 B0 E9 95 .H0F.!...J.%....00C0: 8E 2C 5D 04 43 F2 23 9B 42 3F 2E 9A 3A 53 34 ED .,].C.#.B?..:S4.00D0: 39 76 2D A7 07 44 36 02 21 00 8A 51 6F F0 FC DD 9v-..D6.!..Qo...00E0: 8E 5E 78 54 E1 C1 C9 21 AB 9A A5 82 F2 53 11 8E .^xT...!.....S..00F0: 5D AC 31 18 84 D2 DB B0 2D 87 ].1.....-.[2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crt, accessMethod: ocsp accessLocation: URIName: http://ocsp.comodoca4.com]][3]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: 40 09 61 67 F0 BC 83 71 4F DE 12 08 2C 6F D4 D4 @.ag...qO...,o..0010: 2B 76 3D 96 +v=.]][4]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:false PathLen: undefined][5]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca4.com/COMODOECCDomainValidationSecureServerCA2.crl]]][6]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.2.7][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1D 68 74 74 70 73 3A 2F 2F 73 65 63 75 72 65 ..https://secure0010: 2E 63 6F 6D 6F 64 6F 2E 63 6F 6D 2F 43 50 53 .comodo.com/CPS]] ] [CertificatePolicyId: [2.23.140.1.2.1][] ]][7]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][8]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature][9]: ObjectId: 2.5.29.17 Criticality=falseSubjectAlternativeName [ DNSName: ssl412106.cloudflaressl.com DNSName: *.cloudflare.com DNSName: cloudflare.com][10]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 9A D8 94 40 47 A3 54 44 1B C1 F9 02 6A F0 2B E2 [email protected].+.0010: 16 A2 F0 A9 ....]]] Algorithm: [SHA256withECDSA] Signature:0000: 30 45 02 21 00 B6 00 94 6A F8 79 EB 88 7E 63 6C 0E.!....j.y...cl0010: C6 A4 B1 7E A1 29 AE F4 4C D9 60 9A 5A 14 72 54 .....)..L.`.Z.rT0020: AB BE D7 E2 43 02 20 6D B6 67 23 C8 07 C3 56 8C ....C. m.g#...V.0030: 49 BC EF 62 9F 38 98 FB A2 F2 9D 02 85 71 8F 06 I..b.8.......q..0040: E0 49 4C A0 88 0C 52 .IL...R]

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 39 of 51

Page 40: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:11.227997065 CEST

443 49173 104.19.199.151 192.168.2.2 CN=COMODO ECC Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

Thu Sep 25 02:00:00 CEST 2014

Tue Sep 25 01:59:59 CEST 2029

[[ Version: V3 Subject: CN=COMODO ECC Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Signature Algorithm: SHA384withECDSA, OID = 1.2.840.10045.4.3.3 Key: Sun EC public key, 256 bits public x coord: 1003745160476881206339073530943807232389873597117160669404019647835895530218 public y coord: 112735960696801970978259026239805217413696993678636841464359769702732092974253 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) Validity: [From: Thu Sep 25 02:00:00 CEST 2014, To: Tue Sep 25 01:59:59 CEST 2029] Issuer: CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB SerialNumber: [ 5b25ce69 07c42655 66d3390c 99a954ad]Certificate Extensions: 8[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca.com/COMODOECCAddTrustCA.crt, accessMethod: ocsp accessLocation: URIName: http://ocsp.comodoca4.com]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: 75 71 A7 19 48 19 BC 9D 9D EA 41 47 DF 94 C4 48 uq..H.....AG...H0010: 77 99 D3 79 w..y]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:0][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/COMODOECCCertificationAuthority.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0][] ] [CertificatePolicyId: [2.23.140.1.2.1][] ]][6]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][7]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][8]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 40 09 61 67 F0 BC 83 71 4F DE 12 08 2C 6F D4 D4 @.ag...qO...,o..0010: 2B 76 3D 96 +v=.]]] Algorithm: [SHA384withECDSA] Signature:0000: 30 65 02 31 00 AC 68 47 25 80 13 4F 13 56 C0 A2 0e.1..hG%..O.V..0010: 37 09 97 5A 50 C4 E7 ED B4 61 CB 28 8A 0A 11 32 7..ZP....a.(...20020: A6 E2 71 DF 11 01 89 6F 07 7A 20 66 6B 18 D0 B9 ..q....o.z fk...0030: 2E 43 F7 52 6F 02 30 12 85 7C 8E 13 66 92 04 BA .C.Ro.0.....f...0040: 9A 45 09 94 4A 30 61 D1 49 DC 6F EB E7 2D C9 89 .E..J0a.I.o..-..0050: CF 1E 6A 7C EC 85 CE 30 25 59 BA 81 70 34 B8 34 ..j....0%Y..p4.40060: 7F E7 01 D1 E2 CB 52 ......R]

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 40 of 51

Page 41: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:11.227997065 CEST

443 49173 104.19.199.151 192.168.2.2 CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE

Tue May 30 12:48:38 CEST 2000

Sat May 30 12:48:38 CEST 2020

[[ Version: V3 Subject: CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Signature Algorithm: SHA384withRSA, OID = 1.2.840.113549.1.1.12 Key: Sun EC public key, 384 bits public x coord: 504718676234926065942137899967727725147748939990416008051243224596830566821818938794027559496970536471792619027319 public y coord: 21265970918999422738692882112783046384009711943789955724145746314731609596463174196527849391605118874975210138961641 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Tue May 30 12:48:38 CEST 2000, To: Sat May 30 12:48:38 CEST 2020] Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE SerialNumber: [ 4352023f faa8901f 139fe3f4 e5c1444e]Certificate Extensions: 7[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.trust-provider.com]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0 ...z4.&...&T....0010: 24 CB 54 1A $.T.]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:2147483647][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.trust-provider.com/AddTrustExternalCARoot.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0][] ]][6]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][7]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 75 71 A7 19 48 19 BC 9D 9D EA 41 47 DF 94 C4 48 uq..H.....AG...H0010: 77 99 D3 79 w..y]]] Algorithm: [SHA384withRSA] Signature:0000: 1D C7 FA 2E 40 B6 5C 05 4B 0F BC 55 36 01 58 E0 ....@.\.K..U6.X.0010: 53 05 3D 64 FB AC D9 A5 38 B8 A7 21 3B AF 95 5B S.=d....8..!;..[0020: BE 48 C8 D3 43 D4 21 6C 41 ED 09 2D 9C 73 00 71 .H..C.!lA..-.s.q0030: 9C AE 21 73 7E FF 8E 8D B9 8E 58 90 8E FC 8C 6D ..!s......X....m0040: 76 C8 00 3A 9F 20 A6 2D 7D CC 17 FD CD 98 96 32 v..:. .-.......20050: 09 1A C9 65 FC 04 EB B4 9A 0A 78 E5 97 3B 52 8F ...e......x..;R.0060: 12 C2 74 97 01 9E CF E1 6D 68 D8 93 B9 9C 24 FB ..t.....mh....$.0070: 96 27 48 01 9C EA 94 3F 70 98 41 B3 73 51 37 29 .'H....?p.A.sQ7)0080: E8 F6 01 7A B9 27 B8 24 51 D9 11 68 D4 A6 85 A7 ...z.'.$Q..h....0090: 36 A7 A5 96 BA 80 F8 A6 FD AE 6D 84 20 AE 35 76 6.........m. .5v00A0: 73 42 0F 87 09 EC C5 DC E7 93 03 22 1A 97 EE 9A sB........."....00B0: 8A 51 61 A7 97 26 1E E9 EE 75 51 08 90 05 AF 2F .Qa..&...uQ..../00C0: 9E 13 9C 93 3F 7A FF E6 EB E9 68 79 8C AF E0 B6 ....?z....hy....00D0: FA EE 9B 12 13 FE 45 8C D2 7C D3 35 EB 21 12 93 ......E....5.!..00E0: FE 66 75 26 2A 15 84 26 F7 66 C9 CB 8D BB 09 41 .fu&*..&.f.....A00F0: D4 18 AF B1 B3 10 F5 10 CA 9D 9A 0E B5 75 6A E8 .............uj.]

Sep 12, 2018 03:12:12.247603893 CEST

443 49175 205.185.208.52 192.168.2.2 CN=code.jquery.com CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US

Wed Aug 29 18:55:01 CEST 2018

Tue Nov 27 17:55:01 CET 2018

[[ Version: V3 Subject: CN=code.jquery.com Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 22906106477439650643274419910149342392066133048506128441042973241434093759223134867801865163044927924549206731518026735957990481877986396244202157934388908222185972151727371026925745981912434769090079535089142480614892414461900487776382669764301630730524201021045879767529187905973200454150509366003456432421772819071697267600976935404767241704225572524418736716803786794416457804488098275306274921995027092841651463119824376491478878321348308013162830329923056751571230457914380766512800440070869669212273209126985893174364699823740416215781667681680371654894826437587962022924835800102997987464914578918808870978309 public exponent: 65537 Validity: [From: Wed Aug 29 18:55:01 CEST 2018, To: Tue Nov 27 17:55:01 CET 2018] Issuer: CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US SerialNumber: [ 03e8fdb9 a04cee87 e8940c49 f520660e 7848]Certificate Extensions: 9[1]: ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=falseExtension unknown: DER encoded OCTET string =0000: 04 81

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 41 of 51

Page 42: Automated Malware Analysis Report for https ...

F4 04 81 F1 00 EF 00 76 00 C1 16 4A E0 A7 .........v...J..0010: 72 D2 D4 39 2D C8 0A C1 07 70 D4 F0 C4 9B DE 99 r..9-....p......0020: 1A 48 40 C1 FA 07 51 64 F6 33 60 00 00 01 65 86 [email protected]`...e.0030: D3 08 89 00 00 04 03 00 47 30 45 02 21 00 CD 53 ........G0E.!..S0040: 36 E5 B7 AA B1 B2 7B 3F DC 5C AD C2 55 2F 1F 55 6......?.\..U/.U0050: FE 22 EB E7 A5 EA B5 36 C5 21 BF 24 3F A3 02 20 .".....6.!.$?.. 0060: 75 62 FF F5 87 61 4A A6 F5 FF 22 95 4D 5B 39 98 ub...aJ...".M[9.0070: 6D C4 B0 9B 42 0B AB E4 43 4D E5 4E 0E ED 1F 0B m...B...CM.N....0080: 00 75 00 A4 50 12 69 05 5A 15 54 5E 62 11 AB 37 .u..P.i.Z.T^b..70090: BC 10 3F 62 AE 55 76 A4 5E 4B 17 14 45 3E 1B 22 ..?b.Uv.^K..E>."00A0: 10 6A 25 00 00 01 65 86 D3 08 8A 00 00 04 03 00 .j%...e.........00B0: 46 30 44 02 20 0D A2 A4 EA 27 40 DA 09 03 09 D0 F0D. ....'@.....00C0: BF AE 21 28 B1 AF AA AF 8D A7 8C 53 B3 D3 D2 07 ..!(.......S....00D0: CD EF 96 51 E6 02 20 35 90 8A 9D 49 D9 A9 D1 60 ...Q.. 5...I...`00E0: 8D 4F 25 92 1E F1 C4 3A 1B 32 D0 42 43 6C AC 49 .O%....:.2.BCl.I00F0: A8 8B 28 29 B9 57 BE ..().W.[2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.int-x3.letsencrypt.org, accessMethod: caIssuers accessLocation: URIName: http://cert.int-x3.letsencrypt.org/]][3]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: A8 4A 6A 63 04 7D DD BA E6 D1 39 B7 A6 45 65 EF .Jjc......9..Ee.0010: F3 A8 EC A1 ....]][4]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:false PathLen: undefined][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.23.140.1.2.1][] ] [CertificatePolicyId: [1.3.6.1.4.1.44947.1.1.1][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1A 68 74 74 70 3A 2F 2F 63 70 73 2E 6C 65 74 ..http://cps.let0010: 73 65 6E 63 72 79 70 74 2E 6F 72 67 sencrypt.org], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 81 9E 0C 81 9B 54 68 69 73 20 43 65 72 74 69 0.....This Certi0010: 66 69 63 61 74 65 20 6D 61 79 20 6F 6E 6C 79 20 ficate may only 0020: 62 65 20 72 65 6C 69 65 64 20 75 70 6F 6E 20 62 be relied upon b0030: 79 20 52 65 6C 79 69 6E 67 20 50 61 72 74 69 65 y Relying Partie0040: 73 20 61 6E 64 20 6F 6E 6C 79 20 69 6E 20 61 63 s and only in ac0050: 63 6F 72 64 61 6E 63 65 20 77 69 74 68 20 74 68 cordance with th0060: 65 20 43 65 72 74 69 66 69 63 61 74 65 20 50 6F e Certificate Po0070: 6C 69 63 79 20 66 6F 75 6E 64 20 61 74 20 68 74 licy found at ht0080: 74 70 73 3A 2F 2F 6C 65 74 73 65 6E 63 72 79 70 tps://letsencryp0090: 74 2E 6F 72 67 2F 72 65 70 6F 73 69 74 6F 72 79 t.org/repository00A0: 2F /]] ]][6]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][7]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_Encipherment][8]: ObjectId: 2.5.29.17 Criticality=falseSubjectAlternativeName [ DNSName: code.jquery.com DNSName: content.jquery.com DNSName: static.jquery.com][9]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 0E 39 48 E0 40 5C A8 F6 E2 CD 4D C7 5F 8B B2 EF .9H.@\....M._...0010: 92 FE 51 E4 ..Q.]]] Algorithm: [SHA256withRSA] Signature:0000: 31 02 0B CD 6F 57 7E 48 9E 1B BE 2F 2C 0E DD AC 1...oW.H.../,...0010: B1 0F FE 88 DD D8 16 93 FA 31 5F 61 C5 E1 67 D9 .........1_a..g.0020: FC 70 06 ED A1 A8 0A 18 A4 D4 D2 98 AB 16 9D 52 .p.............R0030: D0 B9 85 E4 32 81 4C FA 73 28 3A 0B 01 2E 18 B8 ....2.L.s(:.....0040: 6D 0F 1F BA E2 9D 2D 72 C6 4C 9C EC 2A 3B 12 CA m.....-r.L..*;..0050: F6 B7 E4 46 8E 14 46 F2 0F 55 61 0C 2A F7 8D CC ...F..F..Ua.*...0060: BB 0F D0 E7 48 88 BE 14 74 07 92 D4 92 AB 07 B2 ....H...t.......0070: 55 53 7E 8E AD D3 66 32 02 DD 12 D8 54 5D 12 E6 US....f2....T]..0080: D0 41 37 78 44 8A 39 B6 02 42 DD 55 68 80 BC C3 .A7xD.9..B.Uh...0090: F5 8F 56 9B 4E D6 63 44 6D E8 FC 86 84 4C 7B 03 ..V.N.cDm....L..00A0: 86 BE 5A 4E C9 1B 29 C0 D0 F4 91 01 F8 BD 47 73 ..ZN..).......Gs00B0: 35 FD 1E C2 C8 C7 04 8B 7C 7D F2 30 81 7F 6B 88 5..........0..k.00C0: 8B D1 2D 27 39 46 94 90 C9 5C 8A 2A 50 5A 07 DA ..-'9F...\.*PZ..00D0: DA C4 9C B5 CB 2B 06 EE D0 F3 7E 6E 6C F7 25 78

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 42 of 51

Page 43: Automated Malware Analysis Report for https ...

.....+.....nl.%x00E0: 8D 5B 2C 15 9D 0C EB 29 D8 A2 29 55 A8 E1 A1 05 .[,....)..)U....00F0: 2C 8A 1F 9F F2 5C E7 31 32 CB A2 47 50 E4 59 79 ,....\.12..GP.Yy]

Sep 12, 2018 03:12:12.247603893 CEST

443 49175 205.185.208.52 192.168.2.2 CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US

CN=DST Root CA X3, O=Digital Signature Trust Co.

Thu Mar 17 17:40:46 CET 2016

Wed Mar 17 17:40:46 CET 2021

[[ Version: V3 Subject: CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 19797248476075437682355852246492227182925025209894527646389863306257272162327717438476096960751529894413137923782807258828237626757946953550223743258656059351948211427799114263948499232121738590221774214131983890556391436336270214266656447169277800971416884432628642288505627878176138101439755752196484972290641499489076846352390454201028735981960275647482014359370041238010607728611828345534572152635280172155598035959878659370929022966413402097129857505568509453268467065766156311136296802046438183697980908977865999500405760226706893415483460747503705792669060406182022181441316967415301631965711690685520847684499 public exponent: 65537 Validity: [From: Thu Mar 17 17:40:46 CET 2016, To: Wed Mar 17 17:40:46 CET 2021] Issuer: CN=DST Root CA X3, O=Digital Signature Trust Co. SerialNumber: [ 0a014142 00000153 85736a0b 85eca708]Certificate Extensions: 7[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://isrg.trustid.ocsp.identrust.com, accessMethod: caIssuers accessLocation: URIName: http://apps.identrust.com/roots/dstrootcax3.p7c]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: C4 A7 B1 A4 7B 2C 71 FA DB E1 4B 90 75 FF C4 15 .....,q...K.u...0010: 60 85 89 10 `...]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:0][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.identrust.com/DSTROOTCAX3CRL.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.23.140.1.2.1][] ] [CertificatePolicyId: [1.3.6.1.4.1.44947.1.1.1][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 22 68 74 74 70 3A 2F 2F 63 70 73 2E 72 6F 6F ."http://cps.roo0010: 74 2D 78 31 2E 6C 65 74 73 65 6E 63 72 79 70 74 t-x1.letsencrypt0020: 2E 6F 72 67 .org]] ]][6]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][7]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: A8 4A 6A 63 04 7D DD BA E6 D1 39 B7 A6 45 65 EF .Jjc......9..Ee.0010: F3 A8 EC A1 ....]]] Algorithm: [SHA256withRSA] Signature:0000: DD 33 D7 11 F3 63 58 38 DD 18 15 FB 09 55 BE 76 .3...cX8.....U.v0010: 56 B9 70 48 A5 69 47 27 7B C2 24 08 92 F1 5A 1F V.pH.iG'..$...Z.0020: 4A 12 29 37 24 74 51 1C 62 68 B8 CD 95 70 67 E5 J.)7$tQ.bh...pg.0030: F7 A4 BC 4E 28 51 CD 9B E8 AE 87 9D EA D8 BA 5A ...N(Q.........Z0040: A1 01 9A DC F0 DD 6A 1D 6A D8 3E 57 23 9E A6 1E ......j.j.>W#...0050: 04 62 9A FF D7 05 CA B7 1F 3F C0 0A 48 BC 94 B0 .b.......?..H...0060: B6 65 62 E0 C1 54 E5 A3 2A AD 20 C4 E9 E6 BB DC .eb..T..*. .....0070: C8 F6 B5 C3 32 A3 98 CC 77 A8 E6 79 65 07 2B CB ....2...w..ye.+.0080: 28 FE 3A 16 52 81 CE 52 0C 2E 5F 83 E8 D5 06 33 (.:.R..R.._....30090: FB 77 6C CE 40 EA 32 9E 1F 92 5C 41 C1 74 6C 5B [email protected]...\A.tl[00A0: 5D 0A 5F 33 CC 4D 9F AC 38 F0 2F 7B 2C 62 9D D9 ]._3.M..8./.,b..00B0: A3 91 6F 25 1B 2F 90 B1 19 46 3D F6 7E 1B A6 7A ..o%./...F=....z00C0: 87 B9 A3 7A 6D 18 FA 25 A5 91 87 15 E0 F2 16 2F ...zm..%......./00D0: 58 B0 06 2F 2C 68 26 C6 4B 98 CD DA 9F 0C F9 7F X../,h&.K.......00E0: 90 ED 43 4A 12 44 4E 6F 73 7A 28 EA A4 AA 6E 7B ..CJ.DNosz(...n.00F0: 4C 7D 87 DD E0 C9 02 44 A7 87 AF C3 34 5B B4 42 L......D....4[.B]

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 43 of 51

Page 44: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:12.247603893 CEST

443 49175 205.185.208.52 192.168.2.2 CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US

CN=DST Root CA X3, O=Digital Signature Trust Co.

Thu Mar 17 17:40:46 CET 2016

Wed Mar 17 17:40:46 CET 2021

[[ Version: V3 Subject: CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 19797248476075437682355852246492227182925025209894527646389863306257272162327717438476096960751529894413137923782807258828237626757946953550223743258656059351948211427799114263948499232121738590221774214131983890556391436336270214266656447169277800971416884432628642288505627878176138101439755752196484972290641499489076846352390454201028735981960275647482014359370041238010607728611828345534572152635280172155598035959878659370929022966413402097129857505568509453268467065766156311136296802046438183697980908977865999500405760226706893415483460747503705792669060406182022181441316967415301631965711690685520847684499 public exponent: 65537 Validity: [From: Thu Mar 17 17:40:46 CET 2016, To: Wed Mar 17 17:40:46 CET 2021] Issuer: CN=DST Root CA X3, O=Digital Signature Trust Co. SerialNumber: [ 0a014142 00000153 85736a0b 85eca708]Certificate Extensions: 7[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://isrg.trustid.ocsp.identrust.com, accessMethod: caIssuers accessLocation: URIName: http://apps.identrust.com/roots/dstrootcax3.p7c]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: C4 A7 B1 A4 7B 2C 71 FA DB E1 4B 90 75 FF C4 15 .....,q...K.u...0010: 60 85 89 10 `...]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:0][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.identrust.com/DSTROOTCAX3CRL.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.23.140.1.2.1][] ] [CertificatePolicyId: [1.3.6.1.4.1.44947.1.1.1][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 22 68 74 74 70 3A 2F 2F 63 70 73 2E 72 6F 6F ."http://cps.roo0010: 74 2D 78 31 2E 6C 65 74 73 65 6E 63 72 79 70 74 t-x1.letsencrypt0020: 2E 6F 72 67 .org]] ]][6]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][7]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: A8 4A 6A 63 04 7D DD BA E6 D1 39 B7 A6 45 65 EF .Jjc......9..Ee.0010: F3 A8 EC A1 ....]]] Algorithm: [SHA256withRSA] Signature:0000: DD 33 D7 11 F3 63 58 38 DD 18 15 FB 09 55 BE 76 .3...cX8.....U.v0010: 56 B9 70 48 A5 69 47 27 7B C2 24 08 92 F1 5A 1F V.pH.iG'..$...Z.0020: 4A 12 29 37 24 74 51 1C 62 68 B8 CD 95 70 67 E5 J.)7$tQ.bh...pg.0030: F7 A4 BC 4E 28 51 CD 9B E8 AE 87 9D EA D8 BA 5A ...N(Q.........Z0040: A1 01 9A DC F0 DD 6A 1D 6A D8 3E 57 23 9E A6 1E ......j.j.>W#...0050: 04 62 9A FF D7 05 CA B7 1F 3F C0 0A 48 BC 94 B0 .b.......?..H...0060: B6 65 62 E0 C1 54 E5 A3 2A AD 20 C4 E9 E6 BB DC .eb..T..*. .....0070: C8 F6 B5 C3 32 A3 98 CC 77 A8 E6 79 65 07 2B CB ....2...w..ye.+.0080: 28 FE 3A 16 52 81 CE 52 0C 2E 5F 83 E8 D5 06 33 (.:.R..R.._....30090: FB 77 6C CE 40 EA 32 9E 1F 92 5C 41 C1 74 6C 5B [email protected]...\A.tl[00A0: 5D 0A 5F 33 CC 4D 9F AC 38 F0 2F 7B 2C 62 9D D9 ]._3.M..8./.,b..00B0: A3 91 6F 25 1B 2F 90 B1 19 46 3D F6 7E 1B A6 7A ..o%./...F=....z00C0: 87 B9 A3 7A 6D 18 FA 25 A5 91 87 15 E0 F2 16 2F ...zm..%......./00D0: 58 B0 06 2F 2C 68 26 C6 4B 98 CD DA 9F 0C F9 7F X../,h&.K.......00E0: 90 ED 43 4A 12 44 4E 6F 73 7A 28 EA A4 AA 6E 7B ..CJ.DNosz(...n.00F0: 4C 7D 87 DD E0 C9 02 44 A7 87 AF C3 34 5B B4 42 L......D....4[.B]

Sep 12, 2018 03:12:22.915508032 CEST

443 49180 104.219.251.196 192.168.2.2 CN=firozenterprise.com CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US

Tue Aug 28 02:00:00 CEST 2018

Tue Nov 27 00:59:59 CET 2018

[[ Version: V3 Subject: CN=firozenterprise.com Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 236873619704825587749153170057501448183116280178218180681988992632791656247378692784264793817864478654497995962798730541049315175788950305477305145539891001537965077442653581808463483891630217666529420854372968927837877131604443486838231129295940422300442622505677

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 44 of 51

Page 45: Automated Malware Analysis Report for https ...

98587833320987971363966060466116331185759045106498728101193440200884200788398274280544475492501951703941212893977949486406214372840180016134553962027421630048008584568419442722946863075202734616834382932529121091248957795174551951703277249522481131691603705168631141200768852160211810345246983754903067684260637171864062064742214473336735618360584432431 public exponent: 65537 Validity: [From: Tue Aug 28 02:00:00 CEST 2018, To: Tue Nov 27 00:59:59 CET 2018] Issuer: CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US SerialNumber: [ 76c57b88 1a495509 20ac379a 55f59e72]Certificate Extensions: 10[1]: ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=falseExtension unknown: DER encoded OCTET string =0000: 04 81 F5 04 81 F2 00 F0 00 76 00 EE 4B BD B7 75 .........v..K..u0010: CE 60 BA E1 42 69 1F AB E1 9E 66 A3 0F 7E 5F B0 .`..Bi....f..._.0020: 72 D8 83 00 C4 7B 89 7A A8 FD CB 00 00 01 65 80 r......z......e.0030: 32 10 7B 00 00 04 03 00 47 30 45 02 21 00 F6 32 2.......G0E.!..20040: 59 D5 64 4E 38 45 09 CB 27 8A 77 62 59 C4 28 D0 Y.dN8E..'.wbY.(.0050: FC 40 A7 66 9A AB 6C F5 28 C5 06 4C 38 23 02 20 [email protected].(..L8#. 0060: 11 C4 7C BC 73 5A F4 3C 53 9F 18 F8 7A B9 E1 A1 ....sZ.<S...z...0070: E0 20 33 5E 30 C1 86 0D AB 27 3F C2 92 E8 E2 98 . 3^0....'?.....0080: 00 76 00 DB 74 AF EE CB 29 EC B1 FE CA 3E 71 6D .v..t...)....>qm0090: 2C E5 B9 AA BB 36 F7 84 71 83 C7 5D 9D 4F 37 B6 ,....6..q..].O7.00A0: 1F BF 64 00 00 01 65 80 32 10 B2 00 00 04 03 00 ..d...e.2.......00B0: 47 30 45 02 21 00 DD 77 DA 00 51 C5 18 8C ED EC G0E.!..w..Q.....00C0: 3D AA F4 B6 06 48 6A B7 54 87 97 E0 4A CA D0 16 =....Hj.T...J...00D0: 3C 92 40 1C 24 0D 02 20 04 03 60 76 B8 86 62 C3 <.@.$.. ..`v..b.00E0: BC 63 5C 47 56 4E 87 D1 F3 59 5C 3B 95 29 21 36 .c\GVN...Y\;.)!600F0: F4 84 0C BD 64 FD DC 7E ....d...[2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca.com/cPanelIncCertificationAuthority.crt, accessMethod: ocsp accessLocation: URIName: http://ocsp.comodoca.com]][3]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: 7E 03 5A 65 41 6B A7 7E 0A E1 B8 9D 08 EA 1D 8E ..ZeAk..........0010: 1D 6A C7 65 .j.e]][4]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:false PathLen: undefined][5]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl]]][6]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.2.52][PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1D 68 74 74 70 73 3A 2F 2F 73 65 63 75 72 65 ..https://secure0010: 2E 63 6F 6D 6F 64 6F 2E 63 6F 6D 2F 43 50 53 .comodo.com/CPS]] ] [CertificatePolicyId: [2.23.140.1.2.1][] ]][7]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][8]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_Encipherment][9]: ObjectId: 2.5.29.17 Criticality=falseSubjectAlternativeName [ DNSName: firozenterprise.com DNSName: cpanel.firozenterprise.com DNSName: mail.firozenterprise.com DNSName: webdisk.firozenterprise.com DNSName: webmail.firozenterprise.com DNSName: www.firozenterprise.com][10]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 18 1B 8E CB D0 F2 A5 59 6F 4A 73 0B 13 FA C6 2B .......YoJs....+0010: B5 28 AA 38 .(.8]]] Algorithm: [SHA256withRSA] Signature:0000: 17 71 99 C5 8A C6 42 A8 99 A9 58 FB E2 E4 A5 DF .q....B...X.....0010: 6B D4 90 A4 FD 63 69 A1 97 40 39 EF 30 F2 79 AB [email protected]: 7B 5E FE 23 30 88 AA 7B 40 DF 0E 92 EA 4E 97 75 .^.#[email protected]: A2 D6 22 6B F6 75 6D 1F 8A 74 DA 0C 3E FE 1F A3 .."k.um..t..>...0040: BD 75 96 DB FA B7 05 38 C4 AB 50 35 E8 B9 03 25 .u.....8..P5...%0050: B7 1D DE 3F 59 F3 DC 26 9F 50 2E 6B FE 9A 3A E8 ...?Y..&.P.k..:.0060: F0 4F A8 D8 81 66 54 99 EA 96 33 36 69 DA 05 9B .O...fT...36i...0070: BF 17 1B 81 56 BC 4A 03 1A 72

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 45 of 51

Page 46: Automated Malware Analysis Report for https ...

C7 3C 62 60 28 D2 ....V.J..r.<b`(.0080: D9 8F 4A 61 4C C4 1B 2E 27 79 F4 C9 56 A5 57 E3 ..JaL...'y..V.W.0090: EF 5C C8 E5 32 C3 9E 8B E1 2F E3 40 86 32 53 1E .\..2..../[email protected]: 6F 05 BC 73 42 0D E3 55 2A 79 ED 4E A7 80 E8 41 o..sB..U*y.N...A00B0: BB C4 59 71 E0 F5 B5 B6 B2 25 E5 EB 6C 81 29 CA ..Yq.....%..l.).00C0: 7A 86 25 C1 1C FC E7 10 B6 AE 8E C8 8D 75 36 9C z.%..........u6.00D0: 41 03 A4 5C 08 92 7B 61 0B F0 9C CE BD 9E 73 A5 A..\...a......s.00E0: D1 B1 C4 06 32 9E B0 CD 87 60 CC 9E 8B 26 65 85 ....2....`...&e.00F0: 06 00 C8 B7 C4 AA 5E BC 4B A2 3E 54 54 AB 10 3F ......^.K.>TT..?]

Sep 12, 2018 03:12:22.915508032 CEST

443 49180 104.219.251.196 192.168.2.2 CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US

CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

Mon May 18 02:00:00 CEST 2015

Sun May 18 01:59:59 CEST 2025

[[ Version: V3 Subject: CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US Signature Algorithm: SHA384withRSA, OID = 1.2.840.113549.1.1.12 Key: Sun RSA public key, 2048 bits modulus: 17593480096692713018475895792724075672946153458286563199571628462555198211400353729234678888933040074245743031344110676950225602424239744275580203032388253183641969115414246814221235053912886357650730438318219217508801010315710974463129067389616293028896205864799170095066829527213637069580537424209085616377394665471565050487092639050216078240279738840070252322854082656970094321515205244683618000265664081313419509307371923479181139989769749253107567251365335361691390702907845356758548602034458245938667693881170016372773160251025347753244451417413595842348278925917111831860996925937874910597825547509003460806507 public exponent: 65537 Validity: [From: Mon May 18 02:00:00 CEST 2015, To: Sun May 18 01:59:59 CEST 2025] Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB SerialNumber: [ f01d4bee 7b7ca37b 3c0566ac 05972458]Certificate Extensions: 8[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: caIssuers accessLocation: URIName: http://crt.comodoca.com/COMODORSAAddTrustCA.crt, accessMethod: ocsp accessLocation: URIName: http://ocsp.comodoca.com]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: BB AF 7E 02 3D FA A6 F1 3C 84 8E AD EE 38 98 EC ....=...<....8..0010: D9 32 32 D4 .22.]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:0][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.comodoca.com/COMODORSACertificationAuthority.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.2.52][] ] [CertificatePolicyId: [2.23.140.1.2.1][] ]][6]: ObjectId: 2.5.29.37 Criticality=falseExtendedKeyUsages [ serverAuth clientAuth][7]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][8]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: 7E 03 5A 65 41 6B A7 7E 0A E1 B8 9D 08 EA 1D 8E ..ZeAk..........0010: 1D 6A C7 65 .j.e]]] Algorithm: [SHA384withRSA] Signature:0000: 10 9F A0 60 08 81 74 A1 A0 84 78 60 4C 39 39 DA ...`..t...x`L99.0010: 64 77 EF 19 0A 72 39 23 94 3B 91 7D 7F 34 8B 97 dw...r9#.;...4..0020: 58 4E 59 0A 2D 68 C3 10 42 B0 A0 7A 81 8C 7B AB XNY.-h..B..z....0030: 31 32 20 39 E4 22 73 E0 DE C9 17 5D 83 C5 75 2D 12 9."s....]..u-0040: E1 11 47 59 01 9E 5D C0 F4 DD 12 6A D0 6D 30 20 ..GY..]....j.m0 0050: E8 B3 CA 4F DF 9A E0 A7 17 9F 1A 2F 87 7E EB 50 ...O......./...P0060: E1 53 F3 F8 47 D9 8C 60 F2 C9 65 65 9C F0 DA 01 .S..G..`..ee....0070: E6 B2 F2 D8 07 98 87 DF 37 89 98 55 12 42 C9 E4 ........7..U.B..0080: 2D DE 2D BE AA 64 94 4E D9 2E E6 C2 D5 F2 C0 E6 -.-..d.N........0090: E9 EA 19 3E 37 0B 89 5F C9 3A F8 4F 47 40 3E AF ...>7.._.:.OG@>.00A0: 1A 7F A2 F6 85 01 88 17 36 B5 23 EA B9 FE BA 6B ........6.#....k00B0: 48 0B 02 20 39 AE C3 61 EB 95 A5 A1 73 C7 1C 5F H.. 9..a....s.._00C0: 54 33 73 57 4B 36 8B 9B 5B 28 E3 3E B1 0B 78 5C T3sWK6..[(.>..x\00D0: 6B 14 A7 10 CC E5 DA 3F BA E9 D6 B2 2D 1D 70 54 k......?....-.pT00E0: BA 5E AB 7D 4F 29 89 10 E0 3A 90 04 C5 EE B9 8E .^..O)...:......00F0: 43 A2 E3 63 58 7F 49 8B 71 3E 57 62 23 40 D1 5D C..cX.I.q>Wb#@.]0100: 96 64 22 61 56 9F 96 67 47 87 BC E5 00 20 A4 68 .d"aV..gG.... .h0110: E2 C1 A0 81 7B 68 73 08 C4

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 46 of 51

Page 47: Automated Malware Analysis Report for https ...

6D 4E 70 79 E8 DD 55 .....hs..mNpy..U0120: D7 09 5C B9 9D 0A 95 A6 0C D9 DB E2 8A 55 EB B9 ..\..........U..0130: E1 E7 9A 95 14 4C 58 06 41 C1 10 AA AA B1 3A E2 .....LX.A.....:.0140: A5 4A 4A E0 D9 C9 1F C2 A0 97 BB 06 EF 19 00 DB .JJ.............0150: 02 BE 96 F1 FB 54 8F 93 9A FA 30 22 36 A9 77 26 .....T....0"6.w&0160: 1F 94 28 93 E9 13 3D 45 D1 3A 35 48 1E 98 0D 82 ..(...=E.:5H....0170: 70 C0 0B 5A 28 87 A1 78 51 3F B5 A7 5C A6 91 22 p..Z(..xQ?..\.."0180: 00 42 4C B9 80 15 80 2A B1 2D 89 4F F7 BA 1E 18 .BL....*.-.O....0190: C4 8C 59 1E 73 49 A3 A8 7B BC 1F F7 56 4D 50 9F ..Y.sI......VMP.01A0: 67 16 A7 C7 17 48 E7 6D 54 57 76 6E 97 58 5B 78 g....H.mTWvn.X[x01B0: 64 A4 ED 62 B4 00 3B 06 7E 79 B8 58 5F 6E 84 D6 d..b..;..y.X_n..01C0: 43 BC 4F DB 39 AA 28 F0 C1 89 09 C5 FB E3 18 44 C.O.9.(........D01D0: B7 E5 B2 8B 5D 95 F9 23 5A 0B 72 F7 69 3A D6 57 ....]..#Z.r.i:.W01E0: 8B E1 E9 F4 60 BE C4 51 2B 11 AC FE 48 B3 72 73 ....`..Q+...H.rs01F0: CA 13 50 73 0D 04 76 CA 01 E1 42 C2 D7 21 CF F9 ..Ps..v...B..!..]

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 47 of 51

Page 48: Automated Malware Analysis Report for https ...

Sep 12, 2018 03:12:22.915508032 CEST

443 49180 104.219.251.196 192.168.2.2 CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB

CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE

Tue May 30 12:48:38 CEST 2000

Sat May 30 12:48:38 CEST 2020

[[ Version: V3 Subject: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Signature Algorithm: SHA384withRSA, OID = 1.2.840.113549.1.1.12 Key: Sun RSA public key, 4096 bits modulus: 595250832037245141724642107398533641144111340640849154810839512193646804439589382557795096048235159392412856809181253983148280442751106836828767077478502910675291715965426418324395462826337195608826159904332409833532414343087397304684051488024083060971973988667565926401713702437407307790551210783180012029671811979458976709742365579736599681150756374332129237698142054260771585540729412505699671993111094681722253786369180597052805125225748672266569013967025850135765598233721214965171040686884703517711864518647963618102322884373894861238464186441528415873877499307554355231373646804211013770034465627350166153734933786011622475019872581027516832913754790596939102532587063612068091625752995700206528059096165261547017202283116886060219954285939324476288744352486373249118864714420341870384243932900936553074796547571643358129426474424573956572670213304441994994142333208766235762328926816055054634905252931414737971249889745696283503174642385591131856834241724878687870772321902051261453524679758731747154638983677185705464969589189761598154153383380395065347776922242683529305823609958629983678843126221186204478003285765580771286537570893899006127941280337699169761047271395591258462580922460487748761665926731923248227868312659 public exponent: 65537 Validity: [From: Tue May 30 12:48:38 CEST 2000, To: Sat May 30 12:48:38 CEST 2020] Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE SerialNumber: [ 2766ee56 eb49f38e abd770a2 fc84de22]Certificate Extensions: 7[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=falseAuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.usertrust.com]][2]: ObjectId: 2.5.29.35 Criticality=falseAuthorityKeyIdentifier [KeyIdentifier [0000: AD BD 98 7A 34 B4 26 F7 FA C4 26 54 EF 03 BD E0 ...z4.&...&T....0010: 24 CB 54 1A $.T.]][3]: ObjectId: 2.5.29.19 Criticality=trueBasicConstraints:[ CA:true PathLen:2147483647][4]: ObjectId: 2.5.29.31 Criticality=falseCRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.usertrust.com/AddTrustExternalCARoot.crl]]][5]: ObjectId: 2.5.29.32 Criticality=falseCertificatePolicies [ [CertificatePolicyId: [2.5.29.32.0][] ]][6]: ObjectId: 2.5.29.15 Criticality=trueKeyUsage [ DigitalSignature Key_CertSign Crl_Sign][7]: ObjectId: 2.5.29.14 Criticality=falseSubjectKeyIdentifier [KeyIdentifier [0000: BB AF 7E 02 3D FA A6 F1 3C 84 8E AD EE 38 98 EC ....=...<....8..0010: D9 32 32 D4 .22.]]] Algorithm: [SHA384withRSA] Signature:0000: 64 BF 83 F1 5F 9A 85 D0 CD B8 A1 29 57 0D E8 5A d..._......)W..Z0010: F7 D1 E9 3E F2 76 04 6E F1 52 70 BB 1E 3C FF 4D ...>.v.n.Rp..<.M0020: 0D 74 6A CC 81 82 25 D3 C3 A0 2A 5D 4C F5 BA 8B .tj...%...*]L...0030: A1 6D C4 54 09 75 C7 E3 27 0E 5D 84 79 37 40 13 .m.T.u..'.][email protected]: 77 F5 B4 AC 1C D0 3B AB 17 12 D6 EF 34 18 7E 2B w.....;.....4..+0050: E9 79 D3 AB 57 45 0C AF 28 FA D0 DB E5 50 95 88 .y..WE..(....P..0060: BB DF 85 57 69 7D 92 D8 52 CA 73 81 BF 1C F3 E6 ...Wi...R.s.....0070: B8 6E 66 11 05 B3 1E 94 2D 7F 91 95 92 59 F1 4C .nf.....-....Y.L0080: CE A3 91 71 4C 7C 47 0C 3B 0B 19 F6 A1 B1 6C 86 ...qL.G.;.....l.0090: 3E 5C AA C4 2E 82 CB F9 07 96 BA 48 4D 90 F2 94 >\.........HM...00A0: C8 A9 73 A2 EB 06 7B 23 9D DE A2 F3 4D 55 9F 7A ..s....#....MU.z00B0: 61 45 98 18 68 C7 5E 40 6B 23 F5 79 7A EF 8C B5 aE..h.^@k#.yz...00C0: 6B 8B B7 6F 46 F4 7B F1 3D 4B 04 D8 93 80 59 5A k..oF...=K....YZ00D0: E0 41 24 1D B2 8F 15 60 58 47 DB EF 6E 46 FD 15 .A$....`XG..nF..00E0: F5 D9 5F 9A B3 DB D8 B8 E4 40 B3 CD 97 39 AE 85 [email protected]: BB 1D 8E BC DC 87 9B D1 A6 EF F1 3B 6F 10 38 6F ...........;o.8o]

TimestampSourcePort

DestPort Source IP Dest IP Subject Issuer

NotBefore

NotAfter Raw

Copyright Joe Security LLC 2018 Page 48 of 51

Page 49: Automated Malware Analysis Report for https ...

Code Manipulations

Statistics

Behavior

• iexplore.exe

• iexplore.exe

• ssvagent.exe

Click to jump to process

System Behavior

File ActivitiesFile Activities

Registry ActivitiesRegistry Activities

Start time: 03:11:45

Start date: 12/09/2018

Path: C:\Program Files\Internet Explorer\iexplore.exe

Wow64 process (32bit): false

Commandline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding

Imagebase: 0x1320000

File size: 815312 bytes

MD5 hash: CA1F703CD665867E8132D2946FB55750

Has administrator privileges: true

Programmed in: C, C++ or other language

Reputation: low

File Path Access Attributes Options Completion CountSourceAddress Symbol

File Path Completion CountSourceAddress Symbol

File Path Offset Length Value Ascii Completion CountSourceAddress Symbol

File Path Offset Length Completion CountSourceAddress Symbol

Analysis Process: iexplore.exe PID: 3232 Parent PID: 548Analysis Process: iexplore.exe PID: 3232 Parent PID: 548

General

Copyright Joe Security LLC 2018 Page 49 of 51

Page 50: Automated Malware Analysis Report for https ...

Key Path Completion CountSourceAddress Symbol

Key Path Name Type Data Completion CountSourceAddress Symbol

Key Path Name Type Old Data New Data Completion CountSourceAddress Symbol

File ActivitiesFile Activities

Registry ActivitiesRegistry Activities

Start time: 03:11:45

Start date: 12/09/2018

Path: C:\Program Files\Internet Explorer\iexplore.exe

Wow64 process (32bit): false

Commandline: 'C:\Program Files\Internet Explorer\iexplore.exe' SCODEF:3232 CREDAT:275457 /prefetch:2

Imagebase: 0x1320000

File size: 815312 bytes

MD5 hash: CA1F703CD665867E8132D2946FB55750

Has administrator privileges: true

Programmed in: C, C++ or other language

Reputation: low

File Path Access Attributes Options Completion CountSourceAddress Symbol

File Path Completion CountSourceAddress Symbol

File Path Offset Length Value Ascii Completion CountSourceAddress Symbol

File Path Offset Length Completion CountSourceAddress Symbol

Key Path Name Type Data Completion CountSourceAddress Symbol

Key Path Name Type Old Data New Data Completion CountSourceAddress Symbol

Registry ActivitiesRegistry Activities

Start time: 03:11:46

Start date: 12/09/2018

Path: C:\Program Files\Java\jre1.8.0_144\bin\ssvagent.exe

Wow64 process (32bit): false

Commandline: 'C:\PROGRA~1\Java\JRE18~1.0_1\bin\ssvagent.exe' -new

Imagebase: 0xb50000

File size: 53312 bytes

MD5 hash: 0953A0264879FD1E655B75B63B9083B7

Has administrator privileges: true

Programmed in: C, C++ or other language

Reputation: low

Analysis Process: iexplore.exe PID: 3284 Parent PID: 3232Analysis Process: iexplore.exe PID: 3284 Parent PID: 3232

General

Analysis Process: ssvagent.exe PID: 3356 Parent PID: 3284Analysis Process: ssvagent.exe PID: 3356 Parent PID: 3284

General

Copyright Joe Security LLC 2018 Page 50 of 51

Page 51: Automated Malware Analysis Report for https ...

Disassembly

Key Path Completion CountSourceAddress Symbol

Key Path Name Type Data Completion CountSourceAddress Symbol

Key Path Name Type Old Data New Data Completion CountSourceAddress Symbol

Copyright Joe Security LLC 2018 Page 51 of 51