Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Aug. 17, 2021, 9:53 a.m. | Aug. 17, 2021, 10 a.m. |
-
vbc.exe "C:\Users\test22\AppData\Local\Temp\vbc.exe"
2620
Name | Response | Post-Analysis Lookup |
---|---|---|
cdn.discordapp.com | 162.159.133.233 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49165 -> 162.159.129.233:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49166 -> 162.159.129.233:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49165 162.159.129.233:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da |
TLSv1 192.168.56.102:49166 162.159.129.233:443 |
None | None | None |
section | CODE |
section | DATA |
section | BSS |
packer | BobSoft Mini Delphi -> BoB / BobSoft |
resource name | RXXA |
request | GET https://cdn.discordapp.com/attachments/872498603363536989/876731431555059753/Zmlkqojaxmhcbtpljtjnfjssfmlwqrp |
section | {u'size_of_data': u'0x0003a800', u'virtual_address': u'0x0009a000', u'entropy': 7.3227813066554805, u'name': u'.rsrc', u'virtual_size': u'0x0003a7f8'} | entropy | 7.32278130666 | description | A section with a high entropy has been found | |||||||||
entropy | 0.283292978208 | description | Overall entropy of this PE file is high |
process | vbc.exe | useragent | zipo | ||||||
process | vbc.exe | useragent | aswe |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Win32.Remcos.m!c |
Elastic | malicious (high confidence) |
DrWeb | Trojan.PWS.Banker1.36771 |
MicroWorld-eScan | Trojan.GenericKD.46808468 |
FireEye | Generic.mg.2e11cb22fcff3e1f |
Sangfor | Backdoor.Win32.Remcos.gen |
Cybereason | malicious.3e9d80 |
Arcabit | Trojan.Generic.D2CA3D94 |
BitDefenderTheta | Gen:NN.ZelphiF.34088.ZGX@aqrmlhfi |
Cyren | W32/Delf.EZVQ-4415 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.EPYM |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Backdoor.Win32.Remcos.gen |
BitDefender | Trojan.GenericKD.46808468 |
Avast | Win32:RATX-gen [Trj] |
Tencent | Win32.Backdoor.Remcos.Hroz |
Ad-Aware | Trojan.GenericKD.46808468 |
Sophos | Mal/Generic-S |
F-Secure | Trojan.TR/Injector.whmsn |
McAfee-GW-Edition | BehavesLike.Win32.Fareit.cc |
Emsisoft | Trojan.GenericKD.46808468 (B) |
SentinelOne | Static AI - Malicious PE |
eGambit | Unsafe.AI_Score_100% |
Avira | TR/Injector.whmsn |
MAX | malware (ai score=83) |
Gridinsoft | Trojan.Win32.Downloader.oa |
Microsoft | Trojan:Win32/Fareit!ml |
ZoneAlarm | HEUR:Backdoor.Win32.Remcos.gen |
GData | Win32.Trojan.Agent.WL4XDQ |
Cynet | Malicious (score: 100) |
McAfee | GenericRXAA-AA!2E11CB22FCFF |
VBA32 | TrojanDownloader.Agent |
Malwarebytes | Trojan.MalPack.DLF |
TrendMicro-HouseCall | TROJ_GEN.R06CH07HG21 |
Rising | Trojan.Generic@ML.95 (RDML:GAkzn9YQV6JqBROYqbS6Qg) |
Ikarus | Win32.Outbreak |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Remcos!tr.bdr |
Webroot | W32.Backdoor.Remcos |
AVG | Win32:RATX-gen [Trj] |
CrowdStrike | win/malicious_confidence_60% (W) |
Qihoo-360 | Win32/Backdoor.Remcos.HwUBTlsA |