Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 24, 2021, 7:05 p.m. | June 24, 2021, 7:22 p.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "rEUnrWhtbNahO" C:\Users\test22\AppData\Local\Temp\3EBCE3A4.Png
2648
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
FireEye | Gen:Variant.Bulz.446252 |
CAT-QuickHeal | Trojan.Agentb |
Zillya | Trojan.Convagent.Win32.3606 |
Sangfor | Trojan.Win32.Save.a |
Cyren | W32/Trojan.ESOV-9193 |
Symantec | Trojan.Gen.2 |
ESET-NOD32 | multiple detections |
TrendMicro-HouseCall | TrojanSpy.Win64.NOON.UHBAZCLOC |
Avast | Win32:ExploitX-gen [Expl] |
ClamAV | Win.Trojan.Bulz-9863763-0 |
Kaspersky | Trojan.Win32.Agentb.kkyd |
BitDefender | Gen:Variant.Bulz.446252 |
NANO-Antivirus | Trojan.Win32.Black.ivcpha |
Tencent | Vbs.Trojan.Agent.Dyqe |
Sophos | Mal/VMProtBad-A |
DrWeb | Trojan.Packed2.43111 |
TrendMicro | TROJ_GEN.R002C0PFG21 |
McAfee-GW-Edition | RDN/Generic.com |
Emsisoft | Gen:Variant.Bulz.446252 (B) |
Avira | TR/VB.Agent.doytm |
MAX | malware (ai score=83) |
Antiy-AVL | Trojan/Generic.ASMalwS.32EA3E1 |
Kingsoft | Win32.Troj.Generic.a.(kcloud) |
Microsoft | Trojan:Win32/Tiggre!rfn |
AegisLab | Trojan.Win32.Agentb.4!c |
GData | Script.Trojan.PurpleFox.D |
Cynet | Malicious (score: 99) |
McAfee | RDN/Generic.com |
VBA32 | TScope.Malware-Cryptor.SB |
Rising | Trojan.PurpleFox/MSI!1.D10D (CLASSIC) |
Ikarus | Trojan.Win32.VMProtect |
Fortinet | W32/PossibleThreat |
BitDefenderTheta | Gen:NN.ZedlaF.34758.rG4@aWpFvhd |
AVG | Win32:ExploitX-gen [Expl] |