Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 20, 2021, 9:31 a.m. | May 20, 2021, 9:40 a.m. |
-
rets.exe "C:\Users\test22\AppData\Local\Temp\rets.exe"
1016
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | _RDATA |
FireEye | Generic.mg.c344e0908b85d5fd |
CrowdStrike | win/malicious_confidence_60% (W) |
APEX | Malicious |
Microsoft | Trojan:Script/Phonzy.B!ml |
Cynet | Malicious (score: 100) |
Cybereason | malicious.a13ee5 |