Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 2, 2021, 4:11 p.m. | July 2, 2021, 4:16 p.m. |
-
pat.exe "C:\Users\test22\AppData\Local\Temp\pat.exe"
8564
Name | Response | Post-Analysis Lookup |
---|---|---|
antimalwarebyte.xyz | 185.22.155.64 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49807 -> 185.22.155.64:80 | 2027104 | ET HUNTING Suspicious Zipped Filename in Outbound POST Request (cookies.txt) M2 | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox |
section | .vmp0 |
section | .vmp1 |
suspicious_features | POST method with no referer header | suspicious_request | POST http://antimalwarebyte.xyz/collect.php |
request | POST http://antimalwarebyte.xyz/collect.php |
request | POST http://antimalwarebyte.xyz/collect.php |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox |
section | {u'size_of_data': u'0x005b6e00', u'virtual_address': u'0x003e9000', u'entropy': 7.964269757855913, u'name': u'.vmp1', u'virtual_size': u'0x005b6df0'} | entropy | 7.96426975786 | description | A section with a high entropy has been found | |||||||||
entropy | 0.999743721169 | description | Overall entropy of this PE file is high |
section | .vmp0 | description | Section name indicates VMProtect | ||||||
section | .vmp1 | description | Section name indicates VMProtect |
host | 172.217.25.14 |
file | C:\wallet.dat |
file | C:\Users\test22\AppData\Roaming\Electrum\wallets |
file | C:\Users\Default\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Users\Default User\AppData\Roaming\FileZilla\recentservers.xml |
file | C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml |
file | C:\Users\Default\AppData\Roaming\FileZilla\recentservers.xml |
file | C:\Users\Public\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Users\Public\AppData\Roaming\FileZilla\recentservers.xml |
file | C:\Users\Default User\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Users\All Users\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Users\All Users\AppData\Roaming\FileZilla\recentservers.xml |
file | C:\Users\All Users\AppData\Roaming\.purple\accounts.xml |
file | C:\Users\Default User\AppData\Roaming\.purple\accounts.xml |
file | C:\Users\test22\AppData\Roaming\.purple\accounts.xml |
file | C:\Users\Default\AppData\Roaming\.purple\accounts.xml |
file | C:\Users\Public\AppData\Roaming\.purple\accounts.xml |
Bkav | W32.AIDetect.malware1 |
Elastic | malicious (high confidence) |
McAfee | Artemis!571D311FC434 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_90% (D) |
K7GW | Trojan ( 7000001c1 ) |
K7AntiVirus | Trojan ( 7000001c1 ) |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Packed.VMProtect.VH |
APEX | Malicious |
Kaspersky | Trojan-PSW.Win32.HashCity.mf |
McAfee-GW-Edition | BehavesLike.Win32.Backdoor.tc |
FireEye | Generic.mg.571d311fc434e77d |
Sophos | Mal/Generic-R + Mal/VMProtBad-A |
Ikarus | Trojan.Win32.VMProtect |
Avira | TR/Crypt.XPACK.Gen |
Kingsoft | Win32.PSWTroj.Undef.(kcloud) |
Microsoft | Trojan:Win32/Tnega!ml |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.Reputation.R426616 |
Acronis | suspicious |
BitDefenderTheta | Gen:NN.ZexaF.34770.@BW@auesfFi |
Malwarebytes | Malware.AI.2723236934 |
Rising | Trojan.Generic@ML.99 (RDML:ozipnu8w60GHoLYNBO6C6w) |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
Qihoo-360 | HEUR/QVM19.1.4F0F.Malware.Gen |