Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 25, 2021, 9:34 a.m. | June 25, 2021, 9:38 a.m. |
-
EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office12\EXCEL.EXE" C:\Users\test22\AppData\Local\Temp\PO%2093951170.xls
1868
IP Address | Status | Action |
---|---|---|
104.156.57.250 | Active | Moloch |
109.169.78.226 | Active | Moloch |
162.241.155.78 | Active | Moloch |
164.124.101.2 | Active | Moloch |
166.62.25.253 | Active | Moloch |
185.179.27.103 | Active | Moloch |
187.45.181.35 | Active | Moloch |
52.47.49.164 | Active | Moloch |
66.96.147.106 | Active | Moloch |
69.90.221.129 | Active | Moloch |
72.10.162.214 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49209 52.47.49.164:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=afemnor.es | 14:71:68:be:f2:05:a5:7f:3b:a9:54:37:89:0c:66:d7:41:58:1e:00 |
TLSv1 192.168.56.101:49210 104.156.57.250:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=landingpages.pontodata.com.br | af:50:2b:29:4e:1e:e3:f4:80:80:b4:0d:11:9b:5f:8f:24:8f:5d:08 |
TLSv1 192.168.56.101:49230 109.169.78.226:443 |
C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority | CN=gettingreadytolearn.co.uk | 65:d0:85:40:97:dd:6b:a3:05:4a:0d:d4:23:9c:11:57:36:91:d5:e3 |
TLSv1 192.168.56.101:49217 66.96.147.106:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.661partyrentals.com | 41:f9:db:ee:36:28:3f:0f:d7:48:7a:37:be:45:59:41:f4:d6:f9:0c |
request | GET https://afemnor.es/wp-content/themes/dt-the7/inc/mods/compatibility/elementor/pro/modules/query-contol/FHo2N5GW1hAjyYV.php |
request | GET https://landingpages.pontodata.com.br/wp-content/plugins/duracelltomi-google-tag-manager/integration/whichbrowser/src/Analyser/Header/Useragent/Device/NPIMchMQuv.php |
request | GET https://661partyrentals.com/wp-content/plugins/ultimate-member/templates/email/UhUsapvuN2huM.php |
request | GET https://gettingreadytolearn.co.uk/portal/wall/posts/157/thumbs/BeAsmBuB.php |
com_class | Wscript.Shell | May attempt to create new processes |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 99) |
ALYac | VB:Trojan.Valyria.4710 |
VIPRE | LooksLike.Macro.Malware.gen!x1 (v) |
Arcabit | HEUR.VBA.Trojan.d |
Cyren | X97M/Agent.WF.gen!Eldorado |
Avast | VBA:Crypt-AB [Trj] |
BitDefender | VB:Trojan.Valyria.4710 |
MicroWorld-eScan | VB:Trojan.Valyria.4710 |
Ad-Aware | VB:Trojan.Valyria.4710 |
Emsisoft | VB:Trojan.Valyria.4710 (B) |
TrendMicro | HEUR_VBA.OE |
McAfee-GW-Edition | BehavesLike.OLE2.Downloader.gg |
FireEye | VB:Trojan.Valyria.4710 |
Avira | HEUR/Macro.Downloader.MRAGH.Gen |
Microsoft | TrojanDownloader:O97M/Dridex.BVG!MTB |
GData | VB:Trojan.Valyria.4710 |
TACHYON | Suspicious/X97M.Obfus.Gen.6 |
MAX | malware (ai score=86) |
Zoner | Probably Heur.W97Obfuscated |
SentinelOne | Static AI - Malicious OLE |
Fortinet | VBA/Agent.WCP!tr.dldr |
AVG | VBA:Crypt-AB [Trj] |
payload_url | https://decontaminationcovid19.com/wp-content/plugins/ultimate-elementor/compatibility/modules/73XtsqnqdwHAQp.php |