Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 18, 2021, 11:17 a.m. | Aug. 18, 2021, 11:28 a.m. |
-
hot.exe "C:\Users\test22\AppData\Local\Temp\hot.exe"
1896
Name | Response | Post-Analysis Lookup |
---|---|---|
www.rakennuspalveluporola.net | 34.102.136.180 | |
www.numerologistreading.com |
CNAME
numerologistreading.com
|
35.209.90.116 |
www.mission-duplex.com | 104.21.87.174 |
Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\code\16\cal\Release\cal.pdb |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.numerologistreading.com/pjje/?EfBt4J58=KXVTcvbjXDD0gNgiMX+DPSy5YiGOmUOJbVJCTGBH734hiXpMW6Qv+6qjmAKa6Qo7kv8Emjmh&ohoXP=SzrlsD | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.mission-duplex.com/pjje/?EfBt4J58=kmMGCOOuyZn/Q8N+atCeYTYJw4/WIfZPwWB6wlOMycBYg5A/spRsR9LEwaIQQxcsBMDpWJd1&ohoXP=SzrlsD | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.rakennuspalveluporola.net/pjje/?EfBt4J58=tciR5RhO8AOzFF2Y0LHmIQxwfdqW3+4WiATtW4d/M7Ww/p8yIrAXWYz16zTljOVX4hXvSiko&ohoXP=SzrlsD |
request | GET http://www.numerologistreading.com/pjje/?EfBt4J58=KXVTcvbjXDD0gNgiMX+DPSy5YiGOmUOJbVJCTGBH734hiXpMW6Qv+6qjmAKa6Qo7kv8Emjmh&ohoXP=SzrlsD |
request | GET http://www.mission-duplex.com/pjje/?EfBt4J58=kmMGCOOuyZn/Q8N+atCeYTYJw4/WIfZPwWB6wlOMycBYg5A/spRsR9LEwaIQQxcsBMDpWJd1&ohoXP=SzrlsD |
request | GET http://www.rakennuspalveluporola.net/pjje/?EfBt4J58=tciR5RhO8AOzFF2Y0LHmIQxwfdqW3+4WiATtW4d/M7Ww/p8yIrAXWYz16zTljOVX4hXvSiko&ohoXP=SzrlsD |
section | {u'size_of_data': u'0x0006ba00', u'virtual_address': u'0x0002b000', u'entropy': 7.667193248252193, u'name': u'.data', u'virtual_size': u'0x0006daa4'} | entropy | 7.66719324825 | description | A section with a high entropy has been found | |||||||||
entropy | 0.680632411067 | description | Overall entropy of this PE file is high |
host | 104.21.19.200 |
Lionic | Trojan.Win32.Zusy.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Zusy.397809 |
FireEye | Generic.mg.5fcbfeae2b818e9e |
ALYac | Gen:Variant.Zusy.397809 |
Malwarebytes | Malware.AI.1850730742 |
Cybereason | malicious.97d898 |
BitDefenderTheta | Gen:NN.ZexaF.34088.NuW@aO6OU7mO |
Cyren | W32/Faker.AF.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | Win32/Formbook.AA |
APEX | Malicious |
Paloalto | generic.ml |
BitDefender | Gen:Variant.Zusy.397809 |
Avast | FileRepMalware |
Rising | Trojan.Kryptik!1.D6EE (CLASSIC) |
Ad-Aware | Gen:Variant.Zusy.397809 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.jc |
Sophos | Mal/Generic-R |
Webroot | W32.Malware.Gen |
MAX | malware (ai score=87) |
Gridinsoft | Trojan.Win32.Kryptik.oa |
GData | Gen:Variant.Zusy.397809 |
Cynet | Malicious (score: 100) |
Acronis | suspicious |
TrendMicro-HouseCall | TROJ_GEN.R002H0CHH21 |
SentinelOne | Static AI - Malicious PE |
Fortinet | W32/Agent.FAA!tr |
AVG | FileRepMalware |
Panda | Trj/RnkBend.A |
CrowdStrike | win/malicious_confidence_100% (W) |
MaxSecure | Trojan.Malware.300983.susgen |