Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 12, 2021, 10:09 a.m. | May 12, 2021, 10:11 a.m. |
-
-
slot Charges.exe "C:\Users\test22\AppData\Local\Temp\slot Charges.exe"
1160
-
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.rafbar.com/u8nw/?ArR=GTZNlL4srifKV7o+w2siTAOBcwC+lUBY5oxqGvkubCu3nseBJgD5e0+L6/JLHdvG2vg5MIvg&I6A=4hLpNJ | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ultimatepoolwater.com/u8nw/?ArR=5pV3Y3LQlTAHcxwnvg+J5bdrE68HsxNUtav1EpPN7ScspS4D4Pk/4j83n4j7zgJV+i3d5aNd&I6A=4hLpNJ | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.customessayjojo.com/u8nw/?ArR=VD0G0CGdCcqSJGj9F5ozBooVoq7ayOcemun/I6O/ytbQ1s6HP9Wd06MBA5a//0vZR3htC47K&I6A=4hLpNJ | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.lifehakershagirl.online/u8nw/?ArR=EXiYcxo4bbCmOiu8jraNZMcl9Xa41Px+Bk+bYaDVKnF62kAJD39G59r42R29jKW5593tei3D&I6A=4hLpNJ | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.bloodtypealpha.com/u8nw/?ArR=yoc8xqwT44MyZdAyBAA1pFVBjk8JhV1KxJr6rO/M4XaWItqc4FsSwgggqnIeqmBydcMzsW89&I6A=4hLpNJ |
request | POST http://www.rafbar.com/u8nw/ |
request | GET http://www.rafbar.com/u8nw/?ArR=GTZNlL4srifKV7o+w2siTAOBcwC+lUBY5oxqGvkubCu3nseBJgD5e0+L6/JLHdvG2vg5MIvg&I6A=4hLpNJ |
request | POST http://www.ultimatepoolwater.com/u8nw/ |
request | GET http://www.ultimatepoolwater.com/u8nw/?ArR=5pV3Y3LQlTAHcxwnvg+J5bdrE68HsxNUtav1EpPN7ScspS4D4Pk/4j83n4j7zgJV+i3d5aNd&I6A=4hLpNJ |
request | POST http://www.customessayjojo.com/u8nw/ |
request | GET http://www.customessayjojo.com/u8nw/?ArR=VD0G0CGdCcqSJGj9F5ozBooVoq7ayOcemun/I6O/ytbQ1s6HP9Wd06MBA5a//0vZR3htC47K&I6A=4hLpNJ |
request | POST http://www.lifehakershagirl.online/u8nw/ |
request | GET http://www.lifehakershagirl.online/u8nw/?ArR=EXiYcxo4bbCmOiu8jraNZMcl9Xa41Px+Bk+bYaDVKnF62kAJD39G59r42R29jKW5593tei3D&I6A=4hLpNJ |
request | POST http://www.bloodtypealpha.com/u8nw/ |
request | GET http://www.bloodtypealpha.com/u8nw/?ArR=yoc8xqwT44MyZdAyBAA1pFVBjk8JhV1KxJr6rO/M4XaWItqc4FsSwgggqnIeqmBydcMzsW89&I6A=4hLpNJ |
request | POST http://www.rafbar.com/u8nw/ |
request | POST http://www.ultimatepoolwater.com/u8nw/ |
request | POST http://www.customessayjojo.com/u8nw/ |
request | POST http://www.lifehakershagirl.online/u8nw/ |
request | POST http://www.bloodtypealpha.com/u8nw/ |
file | C:\Users\test22\AppData\Local\Temp\nsv651C.tmp\2r8212a51w7v2sg.dll |
file | C:\Users\test22\AppData\Local\Temp\nsv651C.tmp\2r8212a51w7v2sg.dll |
dead_host | 160.122.148.221:80 |
Bkav | W32.AIDetect.malware1 |
Elastic | malicious (high confidence) |
DrWeb | Trojan.Siggen13.25995 |
MicroWorld-eScan | Gen:Variant.Androm.29 |
FireEye | Generic.mg.5830b69895c4f5b7 |
McAfee | Artemis!5830B69895C4 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Noon.gen |
Alibaba | TrojanSpy:Win32/Gryphon.1988d806 |
Cybereason | malicious.40d632 |
Cyren | W32/Injector.AHU.gen!Eldorado |
Symantec | Packed.Generic.604 |
ESET-NOD32 | Win32/Formbook.AA |
APEX | Malicious |
Avast | Win32:RATX-gen [Trj] |
Kaspersky | HEUR:Trojan-Spy.Win32.Noon.gen |
BitDefender | Gen:Variant.Androm.29 |
Paloalto | generic.ml |
Rising | Trojan.Injector!8.C4 (CLOUD) |
Emsisoft | Gen:Variant.Androm.29 (B) |
Comodo | TrojWare.Win32.Agent.fqmds@0 |
VIPRE | Trojan.Win32.Generic!BT |
McAfee-GW-Edition | BehavesLike.Win32.Vopak.dc |
Sophos | Mal/Generic-S + Troj/Formbo-AEN |
SentinelOne | Static AI - Malicious PE |
Webroot | W32.Trojan.SpyNoon |
Avira | TR/AD.Swotter.kwfap |
MAX | malware (ai score=80) |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Microsoft | Trojan:Win32/Spynoon.VAM!MTB |
GData | Win32.Trojan-Stealer.FormBook.U4IM2P |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Malware/Win.Generic.C4467379 |
ALYac | Spyware.Noon.gen |
TrendMicro-HouseCall | TROJ_GEN.F0D1C00EB21 |
Ikarus | Trojan.Win32.Injector |
Fortinet | W32/Androm.29!tr |
AVG | Win32:RATX-gen [Trj] |
Panda | Trj/CI.A |
CrowdStrike | win/malicious_confidence_90% (W) |