Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 3, 2021, 9:18 a.m. | July 3, 2021, 9:25 a.m. |
-
file10.exe "C:\Users\test22\AppData\Local\Temp\file10.exe"
8452
Name | Response | Post-Analysis Lookup |
---|---|---|
d2js2viceajwla.cloudfront.net |
AAAA
2600:9000:2139:9200:11:6feb:6f80:93a1
AAAA
2600:9000:2139:ae00:11:6feb:6f80:93a1
AAAA
2600:9000:2139:f600:11:6feb:6f80:93a1
AAAA
2600:9000:2139:c000:11:6feb:6f80:93a1
AAAA
2600:9000:2139:9000:11:6feb:6f80:93a1
AAAA
2600:9000:2139:4400:11:6feb:6f80:93a1
AAAA
2600:9000:2139:7c00:11:6feb:6f80:93a1
AAAA
2600:9000:2139:ec00:11:6feb:6f80:93a1
|
99.86.202.23 |
aus.thunderbird.net | 99.86.202.75 | |
kakosidobrosam.gq | 172.67.180.37 | |
prod.balrog.prod.cloudops.mozgcp.net | 35.244.181.201 | |
d2js2viceajwla.cloudfront.net | 99.86.202.23 | |
aus5.mozilla.org | 35.244.181.201 | |
prod.balrog.prod.cloudops.mozgcp.net | 35.244.181.201 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.102:50201 -> 164.124.101.2:53 | 2025104 | ET INFO DNS Query for Suspicious .gq Domain | Potentially Bad Traffic |
TCP 192.168.56.102:49321 -> 104.21.67.197:443 | 2025108 | ET INFO Suspicious Domain (*.gq) in TLS SNI | Potentially Bad Traffic |
TCP 192.168.56.102:49321 -> 104.21.67.197:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49321 104.21.67.197:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | a2:99:7f:61:26:e9:24:3e:96:d0:98:83:eb:e0:35:eb:07:a8:19:f8 |
TLS 1.2 192.168.56.102:49323 99.86.202.125:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=thunderbird.net | dd:92:a0:f3:c5:f2:3a:c7:42:66:30:75:8a:b3:b3:03:6b:8c:df:9d |
TLS 1.2 192.168.56.102:49324 35.244.181.201:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=California, L=Mountain View, O=Mozilla Corporation, CN=aus5.mozilla.org | 37:1a:8a:6e:ae:e7:b7:ae:1f:a9:c0:87:53:e5:a0:94:ef:0b:de:0c |
suspicious_features | GET method with no useragent header | suspicious_request | GET https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C01EC4A57619A16E6AEAA0F47B55BDA9.html | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C4A8B2A795B9148BEAA8D315AA468649.html | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-B70EB8889C1E5B3277197714B6942614.html | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-4BE99CBE54A285D972B1192483666889.html | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-885F730E823499F80A764E9EC20A7875.html |
request | GET https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C01EC4A57619A16E6AEAA0F47B55BDA9.html |
request | GET https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C4A8B2A795B9148BEAA8D315AA468649.html |
request | GET https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-B70EB8889C1E5B3277197714B6942614.html |
request | GET https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-4BE99CBE54A285D972B1192483666889.html |
request | GET https://kakosidobrosam.gq/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-885F730E823499F80A764E9EC20A7875.html |
section | {u'size_of_data': u'0x0000e400', u'virtual_address': u'0x00002000', u'entropy': 7.456477634475075, u'name': u'.text', u'virtual_size': u'0x0000e3f4'} | entropy | 7.45647763448 | description | A section with a high entropy has been found | |||||||||
entropy | 0.966101694915 | description | Overall entropy of this PE file is high |
host | 99.86.144.100 | |||
host | 99.86.144.46 | |||
host | 99.86.144.61 | |||
host | 99.86.144.82 |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.d83c2c4caf2fa8d3 |
McAfee | Artemis!D83C2C4CAF2F |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
Alibaba | Trojan:MSIL/Kryptik.799a8347 |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefenderTheta | Gen:NN.ZemsilF.34790.dm0@airtctmi |
Cyren | W32/MSIL_Kryptik.ECN.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of MSIL/TrojanDownloader.Agent.IFL |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Emsisoft | Trojan.Crypt (A) |
McAfee-GW-Edition | Artemis!Trojan |
Kingsoft | Win32.Troj.Generic_a.a.(kcloud) |
Microsoft | Trojan:Win32/Bomitag.D!ml |
AegisLab | Trojan.MSIL.Stealer.l!c |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
Cynet | Malicious (score: 100) |
Malwarebytes | Trojan.Crypt.MSIL.Generic |
SentinelOne | Static AI - Malicious PE |
eGambit | Unsafe.AI_Score_92% |
Fortinet | MSIL/Agent.IFL!tr.dldr |
Cybereason | malicious.90782d |
Qihoo-360 | HEUR/QVM03.0.531B.Malware.Gen |