Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 28, 2021, 8:04 a.m. | May 28, 2021, 8:22 a.m. |
-
test.exe "C:\Users\test22\AppData\Local\Temp\test.exe"
2856
Name | Response | Post-Analysis Lookup |
---|---|---|
ieaspk.com | 67.220.184.98 | |
vunachiimpex.xyz |
Suricata Alerts
Suricata TLS
No Suricata TLS
suspicious_features | GET method with no useragent header | suspicious_request | GET http://vunachiimpex.xyz/buta/vuga.exe |
request | GET http://vunachiimpex.xyz/buta/vuga.exe |
Elastic | malicious (high confidence) |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan-Downloader ( 0057c3331 ) |
Alibaba | Trojan:MSIL/Generic.25b90c05 |
K7GW | Trojan-Downloader ( 0057c3331 ) |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of MSIL/TrojanDownloader.Agent.HWU |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-PSW.MSIL.Agensla.gen |
Avast | FileRepMalware |
McAfee-GW-Edition | Artemis!Trojan |
Sophos | Mal/Generic-S |
eGambit | Unsafe.AI_Score_57% |
AegisLab | Trojan.MSIL.Agensla.i!c |
ZoneAlarm | HEUR:Trojan-PSW.MSIL.Agensla.gen |
Microsoft | Trojan:Win32/Wacatac.B!ml |
McAfee | RDN/Generic Downloader.x |
TrendMicro-HouseCall | TROJ_GEN.R002H0DER21 |
Rising | Downloader.Agent!8.B23 (CLOUD) |
SentinelOne | Static AI - Suspicious PE |
Fortinet | MSIL/Bulz.0420!tr |
BitDefenderTheta | Gen:NN.ZemsilF.34692.am0@aqK@g3m |
AVG | FileRepMalware |
CrowdStrike | win/malicious_confidence_90% (W) |