Summary | ZeroBOX

ee.txt

NPKI Antivirus
Category Machine Started Completed
FILE s1_win7_x6402 May 25, 2021, 3:23 p.m. May 25, 2021, 3:26 p.m.
Size 4.7KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 4124e889a26b37658b95119b69bb8c39
SHA256 62903fb8f176f352a3171fc845306f7a9a591a8096090a2fb66064840b8414ee
CRC32 F44C5209
ssdeep 96:85oskvmU+u1ViXyzQX1f0gUe3X87J3aLQ4UtX4QLoBf/ETQjOfjjepUc/:Mosmmxuj0yzCWIn8oZUx7DMAjCpUc/
Yara
  • Antivirus - Contains references to security software

Name Response Post-Analysis Lookup
warms.atwebpages.com 185.176.43.98
IP Address Status Action
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
185.176.43.98 Active Moloch

suspicious_features POST method with no referer header, POST method with no useragent header suspicious_request POST http://warms.atwebpages.com/rh/post.php
suspicious_features GET method with no useragent header suspicious_request GET http://warms.atwebpages.com/rh/ee.down
suspicious_features GET method with no useragent header suspicious_request GET http://warms.atwebpages.com/rh/del.php?filename=ee
request POST http://warms.atwebpages.com/rh/post.php
request GET http://warms.atwebpages.com/rh/ee.down
request GET http://warms.atwebpages.com/rh/del.php?filename=ee
request POST http://warms.atwebpages.com/rh/post.php
host 172.217.25.14