Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 20, 2021, 7:48 a.m. | May 20, 2021, 7:54 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
www.geoplugin.net |
CNAME
geoplugin.net
|
178.237.33.50 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .gfids |
request | GET http://www.geoplugin.net/json.gp |
file | C:\Users\test22\AppData\Local\Temp\_MEI22122\libssl-1_1.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI22122\pywintypes37.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI22122\VCRUNTIME140.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI22122\pythoncom37.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI22122\libcrypto-1_1.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI22122\python37.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI22122\mfc140u.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI22122\sqlite3.dll |
Alibaba | Trojan:Win32/Wofith.b656acaa |
Cyren | W64/CookieStealera.G.gen!Eldorado |
Symantec | Trojan.Gen.MBT |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | Trojan.Win32.Wofith.haf |
McAfee-GW-Edition | BehavesLike.Win64.Dropper.tc |
Webroot | W32.Malware.Gen |
Avira | TR/ATRAPS.Gen |
MAX | malware (ai score=95) |
Microsoft | Trojan:Win32/Sabsik.FT.A!ml |
AegisLab | Trojan.Win32.Wofith.4!c |
Cynet | Malicious (score: 99) |
AhnLab-V3 | Trojan/Win.SpyAgent.C4385667 |
McAfee | Artemis!F3CFDE24B4DC |
Malwarebytes | Malware.AI.4178029874 |
Fortinet | Malicious_Behavior.SB |
AVG | Win64:Malware-gen |
Avast | Win64:Malware-gen |