Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 29, 2021, 9:52 a.m. | July 29, 2021, 10 a.m. |
-
-
svchost.exe "C:\Users\test22\AppData\Local\Temp\vbc.exe"
2152
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.lotusinplay247.com |
CNAME
lotusinplay247.com
|
3.108.71.249 |
www.hybrid-sol.com |
CNAME
hybrid-sol.com
|
95.216.102.241 |
www.q99f.com |
CNAME
epoxttc4kk.hellomyai.com
|
134.122.133.171 |
www.fortmyerscruisevacation.com | 34.102.136.180 |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .gfids |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.hybrid-sol.com/dd2v/?5jrDZDS=QU76MMVDaEalz7inlspnMh66/1hVeZvVrtBx8jpddEDRMVGqwAVNDg/Yi8GXR76xKGaxYqiQ&kxl0db=LhH8 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fortmyerscruisevacation.com/dd2v/?5jrDZDS=nhj7AeJneWpfdej/qaMWIItsPR9NP5l0GvNSoiv+0Olc+IAL+00AVB05K12uB4NevRRrPgK/&kxl0db=LhH8 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.q99f.com/dd2v/?5jrDZDS=zjDRxF5X1wZRPIzYbdlYAg34k3BLnyx0cmez+iV0Xc8ymW4mETi0Mumbu1nv3zHBsM04IXAc&kxl0db=LhH8 |
request | GET http://www.hybrid-sol.com/dd2v/?5jrDZDS=QU76MMVDaEalz7inlspnMh66/1hVeZvVrtBx8jpddEDRMVGqwAVNDg/Yi8GXR76xKGaxYqiQ&kxl0db=LhH8 |
request | GET http://www.fortmyerscruisevacation.com/dd2v/?5jrDZDS=nhj7AeJneWpfdej/qaMWIItsPR9NP5l0GvNSoiv+0Olc+IAL+00AVB05K12uB4NevRRrPgK/&kxl0db=LhH8 |
request | GET http://www.q99f.com/dd2v/?5jrDZDS=zjDRxF5X1wZRPIzYbdlYAg34k3BLnyx0cmez+iV0Xc8ymW4mETi0Mumbu1nv3zHBsM04IXAc&kxl0db=LhH8 |
dead_host | 3.108.71.249:80 |
Bkav | W32.AIDetect.malware1 |
Lionic | Trojan.Multi.Generic.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.46700343 |
FireEye | Generic.mg.a584c1efdc2d5911 |
McAfee | Artemis!A584C1EFDC2D |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_70% (W) |
Alibaba | Trojan:Win32/runner.ali1000123 |
Cyren | W32/GameHack.AG.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/GenKryptik.FIBP |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.GenericKD.46700343 |
Avast | Win32:MalwareX-gen [Trj] |
Ad-Aware | Trojan.GenericKD.46700343 |
DrWeb | Trojan.Inject4.14771 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.gc |
Sophos | Mal/Generic-S |
eGambit | Unsafe.AI_Score_99% |
Avira | HEUR/AGEN.1139979 |
MAX | malware (ai score=99) |
Kingsoft | Win32.Troj.Generic_a.a.(kcloud) |
Microsoft | Trojan:Win32/Tnega.RV!MTB |
GData | Win32.Trojan-Stealer.FormBook.DNEOHJ |
Cynet | Malicious (score: 100) |
BitDefenderTheta | Gen:NN.ZexaF.34050.zuZ@aWZsVdde |
VBA32 | BScope.Trojan-Dropper.Injector |
Malwarebytes | MachineLearning/Anomalous.100% |
Rising | Trojan.Generic@ML.88 (RDML:NDYJWqSCQMsgdF2nPeOFug) |
SentinelOne | Static AI - Suspicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/GenKryptik.FIBB |
AVG | Win32:MalwareX-gen [Trj] |
Qihoo-360 | Win32/TrojanSpy.Noon.HgIASZQA |