Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 4, 2021, 9:30 a.m. | Aug. 4, 2021, 9:51 a.m. |
-
-
bincrypted.exe "C:\Users\test22\AppData\Local\Temp\bincrypted.exe"
1896
-
IP Address | Status | Action |
---|---|---|
104.17.66.15 | Active | Moloch |
154.212.216.43 | Active | Moloch |
163.123.204.26 | Active | Moloch |
164.124.101.2 | Active | Moloch |
164.68.104.58 | Active | Moloch |
198.74.106.237 | Active | Moloch |
23.108.179.100 | Active | Moloch |
23.227.38.74 | Active | Moloch |
34.102.136.180 | Active | Moloch |
34.80.190.141 | Active | Moloch |
74.208.236.178 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\xampp\htdocs\Cryptor\0238f0732c6a40e5a54bccb37ef03c58\Loader\Project1\Release\Project1.pdb |
section | .gfids |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.twinedinmagic.com/ehp9/?DXFTJ=I8oiP9SoG5h48m6KhZc1JhaZpcQmSrut+JcyFmPalQS48JdChQkexhtZM/EBi3DjLJXpgbrL&Jt7=XPv4nH2h | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.lovebodystyles.com/ehp9/?DXFTJ=fQONYJVf+drtsBymL6LN0IYUYxuzf9afeJHOCvotCVRqAxc+aKra+zVgjtRtDEfwsmLVAV7e&Jt7=XPv4nH2h | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.macrovigilance.com/ehp9/?DXFTJ=TrVpt/Sm2xJ9IGi4K3NwgAhB6j/uvsDHzHwNFROlzNa3rgYvh2eLdGW0sMsxruWtvTWJfmAK&Jt7=XPv4nH2h | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.tunnurl.com/ehp9/?DXFTJ=QhkqBxVohxlqPUcu6G0chdX25ZqKuFpZq4xLpZwu6mKCp53I4Tvx5rMPt0/BXf9pPvuvFI6V&Jt7=XPv4nH2h | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.atokastore.com/ehp9/?DXFTJ=0LqjHGvSuyDGgeop76VF70PcmE//HpHSJ558UeTMc749V6eczRm/Pf3IqfOFmaD//tqFBTEy&Jt7=XPv4nH2h | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.runninghogfarm.com/ehp9/?DXFTJ=TiEJkYh9nBwlrsDRUzymswvqStp9NyNn6K1JUARvaYpBqYPnTPyRdaxdWm2SESo4LeuL0jJk&Jt7=XPv4nH2h | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ejsuniqueclasses.com/ehp9/?DXFTJ=8c/5QoMU/LJp2F/JqDOgvqNfypt6IHckOwRzCQjdzO4ATzLHPoPQ6gSPk/oNBgTWB7oKG4q8&Jt7=XPv4nH2h | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.joinlashedbyjamie.com/ehp9/?DXFTJ=+eGaCpWIeY1GeVLPRfBKIdnCFP4bn1fBUg7gUF+CiQV6Bp5ohh8tCc+mNs21JISC/amISJ9y&Jt7=XPv4nH2h | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.circusocks.com/ehp9/?DXFTJ=oRr9ZXzYir31EMpQ4cLVquMpSAfNXH/ZGOcaxDo65nuPHc2Zv4aHZ1gD7lNSjr7j2ZXrkkv7&Jt7=XPv4nH2h | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.nazarppe.com/ehp9/?DXFTJ=ForhLKJW5s3cPVf6/6Q1cyVpQBFSYL410ahzi4TIJRZgcvQolUc5UDI3pLbwinN7hftJyfKf&Jt7=XPv4nH2h | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ifn.xyz/ehp9/?DXFTJ=52eH09aBYPtE5DyiejMY8v2uxe7c6i3pelrpIF5DWEK+lqUjHfhnU3NPACtVlTQkZMRHjcr5&Jt7=XPv4nH2h | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.466se.com/ehp9/?DXFTJ=UsPTfcJ2cekV2xN0pFMXthX3126RUWmODdc5A73g6eF5qcZ7S3zbdbbJe1Glq8VOYp62ahzf&Jt7=XPv4nH2h |
request | POST http://www.twinedinmagic.com/ehp9/ |
request | GET http://www.twinedinmagic.com/ehp9/?DXFTJ=I8oiP9SoG5h48m6KhZc1JhaZpcQmSrut+JcyFmPalQS48JdChQkexhtZM/EBi3DjLJXpgbrL&Jt7=XPv4nH2h |
request | POST http://www.lovebodystyles.com/ehp9/ |
request | GET http://www.lovebodystyles.com/ehp9/?DXFTJ=fQONYJVf+drtsBymL6LN0IYUYxuzf9afeJHOCvotCVRqAxc+aKra+zVgjtRtDEfwsmLVAV7e&Jt7=XPv4nH2h |
request | GET http://www.macrovigilance.com/ehp9/?DXFTJ=TrVpt/Sm2xJ9IGi4K3NwgAhB6j/uvsDHzHwNFROlzNa3rgYvh2eLdGW0sMsxruWtvTWJfmAK&Jt7=XPv4nH2h |
request | POST http://www.tunnurl.com/ehp9/ |
request | GET http://www.tunnurl.com/ehp9/?DXFTJ=QhkqBxVohxlqPUcu6G0chdX25ZqKuFpZq4xLpZwu6mKCp53I4Tvx5rMPt0/BXf9pPvuvFI6V&Jt7=XPv4nH2h |
request | POST http://www.atokastore.com/ehp9/ |
request | GET http://www.atokastore.com/ehp9/?DXFTJ=0LqjHGvSuyDGgeop76VF70PcmE//HpHSJ558UeTMc749V6eczRm/Pf3IqfOFmaD//tqFBTEy&Jt7=XPv4nH2h |
request | POST http://www.runninghogfarm.com/ehp9/ |
request | GET http://www.runninghogfarm.com/ehp9/?DXFTJ=TiEJkYh9nBwlrsDRUzymswvqStp9NyNn6K1JUARvaYpBqYPnTPyRdaxdWm2SESo4LeuL0jJk&Jt7=XPv4nH2h |
request | POST http://www.ejsuniqueclasses.com/ehp9/ |
request | GET http://www.ejsuniqueclasses.com/ehp9/?DXFTJ=8c/5QoMU/LJp2F/JqDOgvqNfypt6IHckOwRzCQjdzO4ATzLHPoPQ6gSPk/oNBgTWB7oKG4q8&Jt7=XPv4nH2h |
request | POST http://www.joinlashedbyjamie.com/ehp9/ |
request | GET http://www.joinlashedbyjamie.com/ehp9/?DXFTJ=+eGaCpWIeY1GeVLPRfBKIdnCFP4bn1fBUg7gUF+CiQV6Bp5ohh8tCc+mNs21JISC/amISJ9y&Jt7=XPv4nH2h |
request | POST http://www.circusocks.com/ehp9/ |
request | GET http://www.circusocks.com/ehp9/?DXFTJ=oRr9ZXzYir31EMpQ4cLVquMpSAfNXH/ZGOcaxDo65nuPHc2Zv4aHZ1gD7lNSjr7j2ZXrkkv7&Jt7=XPv4nH2h |
request | POST http://www.nazarppe.com/ehp9/ |
request | GET http://www.nazarppe.com/ehp9/?DXFTJ=ForhLKJW5s3cPVf6/6Q1cyVpQBFSYL410ahzi4TIJRZgcvQolUc5UDI3pLbwinN7hftJyfKf&Jt7=XPv4nH2h |
request | POST http://www.ifn.xyz/ehp9/ |
request | GET http://www.ifn.xyz/ehp9/?DXFTJ=52eH09aBYPtE5DyiejMY8v2uxe7c6i3pelrpIF5DWEK+lqUjHfhnU3NPACtVlTQkZMRHjcr5&Jt7=XPv4nH2h |
request | POST http://www.466se.com/ehp9/ |
request | GET http://www.466se.com/ehp9/?DXFTJ=UsPTfcJ2cekV2xN0pFMXthX3126RUWmODdc5A73g6eF5qcZ7S3zbdbbJe1Glq8VOYp62ahzf&Jt7=XPv4nH2h |
request | POST http://www.twinedinmagic.com/ehp9/ |
request | POST http://www.lovebodystyles.com/ehp9/ |
request | POST http://www.tunnurl.com/ehp9/ |
request | POST http://www.atokastore.com/ehp9/ |
request | POST http://www.runninghogfarm.com/ehp9/ |
request | POST http://www.ejsuniqueclasses.com/ehp9/ |
request | POST http://www.joinlashedbyjamie.com/ehp9/ |
request | POST http://www.circusocks.com/ehp9/ |
request | POST http://www.nazarppe.com/ehp9/ |
request | POST http://www.ifn.xyz/ehp9/ |
request | POST http://www.466se.com/ehp9/ |
dead_host | 192.168.56.101:49207 |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Win32.Noon.l!c |
DrWeb | Trojan.Packed2.43330 |
MicroWorld-eScan | Trojan.GenericKD.46727443 |
FireEye | Generic.mg.059b1244ac9fda54 |
ALYac | Generic.Cryptor.X.1735B54E |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
Alibaba | TrojanSpy:Win32/FormBook.46f77094 |
CrowdStrike | win/malicious_confidence_70% (W) |
Arcabit | Generic.Cryptor.X.1735B54E |
BitDefenderTheta | Gen:NN.ZexaF.34050.wyZ@aqwvwKfi |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Kryptik.HLXQ |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-Spy.Win32.Noon.gen |
BitDefender | Trojan.GenericKD.46727443 |
Avast | Win32:MalwareX-gen [Trj] |
Ad-Aware | Trojan.GenericKD.46727443 |
Emsisoft | Generic.Cryptor.X.1735B54E (B) |
McAfee-GW-Edition | BehavesLike.Win32.Generic.fc |
Sophos | Mal/Generic-S |
MaxSecure | Trojan.Malware.300983.susgen |
Avira | TR/Kryptik.sklls |
Microsoft | Trojan:Win32/FormBook.SM!MTB |
GData | Trojan.GenericKD.46727443 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Malware/Win.Generic.C4575975 |
McAfee | RDN/Generic PWS.y |
MAX | malware (ai score=80) |
VBA32 | BScope.Backdoor.Androm |
Malwarebytes | Trojan.Injector |
Rising | Trojan.Kryptik!1.D84E (CLASSIC) |
SentinelOne | Static AI - Suspicious PE |
eGambit | Unsafe.AI_Score_99% |
Fortinet | W32/Kryptik.HLWX!tr |
AVG | Win32:MalwareX-gen [Trj] |
Cybereason | malicious.4ac9fd |
Panda | Trj/CI.A |
Qihoo-360 | Win32/Ransom.Cryptor.HwoCueAA |