Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 9, 2021, 11:24 a.m. | Aug. 9, 2021, 11:30 a.m. |
-
-
Lyzmpvm.exe "C:\Program Files (x86)\Microsoft Ksysqh\Lyzmpvm.exe"
1556
-
Name | Response | Post-Analysis Lookup |
---|---|---|
gg.csgohvh.cc |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:61479 -> 164.124.101.2:53 | 2027758 | ET DNS Query for .cc TLD | Potentially Bad Traffic |
TCP 192.168.56.101:49197 -> 139.196.224.137:8080 | 2027250 | ET INFO Dotted Quad Host DLL Request | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
packer | Armadillo v1.71 |
suspicious_features | Connection to IP address | suspicious_request | GET http://139.196.224.137:8080/NetSyst96.dll |
request | GET http://139.196.224.137:8080/NetSyst96.dll |
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00054650 | size | 0x00000128 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00054650 | size | 0x00000128 | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000542a8 | size | 0x000000bc | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000542a8 | size | 0x000000bc | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00054a60 | size | 0x0000003a | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00054778 | size | 0x00000022 | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000547a0 | size | 0x000002c0 |
file | C:\Program Files\AppPatch\NetSyst96.dll |
host | 139.196.224.137 |
service_name | Wsdnkc rsmrufqa | service_path | C:\Program Files (x86)\Microsoft Ksysqh\Lyzmpvm.exe |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.Cud.Gen.1 |
CAT-QuickHeal | Trojan.Redosdru.18844 |
McAfee | Farfli!294FAB1523DC |
Cylance | Unsafe |
Zillya | Downloader.Agent.Win32.335022 |
Sangfor | Backdoor.Win32.Generic.ky |
K7AntiVirus | Trojan-Downloader ( 004fefdf1 ) |
Alibaba | Backdoor:Win32/Farfli.13c |
K7GW | Trojan-Downloader ( 004fefdf1 ) |
Cybereason | malicious.523dc3 |
Symantec | Downloader!gm |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Agent.CWO |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Downloader.Farfli-6453698-0 |
Kaspersky | HEUR:Backdoor.Win32.Generic |
BitDefender | Trojan.Cud.Gen.1 |
Avast | Win32:Malware-gen |
Tencent | Malware.Win32.Gencirc.10b77a37 |
Ad-Aware | Trojan.Cud.Gen.1 |
Sophos | Mal/Generic-S |
Comodo | TrojWare.Win32.TrojanDownloader.Farfli.CWO@7k0rzk |
DrWeb | Trojan.DownLoader36.59104 |
VIPRE | Trojan.Win32.Generic!BT |
TrendMicro | BKDR_ZEGOST.SM17 |
McAfee-GW-Edition | Farfli!294FAB1523DC |
FireEye | Generic.mg.294fab1523dc3b50 |
Emsisoft | Trojan.Cud.Gen.1 (B) |
SentinelOne | Static AI - Suspicious PE |
GData | Trojan.Cud.Gen.1 |
Jiangmin | Backdoor.Generic.ajkp |
Avira | HEUR/AGEN.1111749 |
MAX | malware (ai score=86) |
Antiy-AVL | Trojan/Generic.ASMalwS.203D8BE |
Gridinsoft | Trojan.Win32.Downloader.sa |
ViRobot | Trojan.Win32.Z.Farfli.688196 |
ZoneAlarm | Trojan-Downloader.Win32.Agent.gen |
Microsoft | TrojanDownloader:Win32/Farfli.F!bit |
Cynet | Malicious (score: 99) |
AhnLab-V3 | Malware/Win32.RL_Generic.R369242 |
TACHYON | Backdoor/W32.Agent.688196 |
VBA32 | BScope.TrojanDownloader.Farfli |
Malwarebytes | Backdoor.Farfli |
TrendMicro-HouseCall | BKDR_ZEGOST.SM17 |
Rising | Downloader.Agent!1.ABFC (CLASSIC) |
Yandex | Trojan.GenAsa!6HyyeQhbdKM |
Ikarus | Trojan-Downloader.Win32.Farfli |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Kryptik.GHFL!tr |