Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 12, 2021, 2:44 p.m. | Sept. 12, 2021, 2:47 p.m. |
-
Habit_Blink.exe "C:\Users\test22\AppData\Local\Temp\Habit_Blink.exe"
1896 -
explorer.exe C:\Windows\Explorer.EXE
1848
Name | Response | Post-Analysis Lookup |
---|---|---|
xz.tq886.cn |
CNAME
xz.tq886.cn.wsdvs.com
|
119.206.200.180 |
tj.rxgif.cn | 106.75.135.138 | |
down.rxgif.cn |
CNAME
down.rxgif.cn.wsdvs.com
|
119.206.200.180 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\Habit_Blink\Release\Demo_Blink.pdb |
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST http://tj.rxgif.cn/api/count/setup2 |
request | GET http://down.rxgif.cn/ddcfg/sbcfg.ini?v202191302442 |
request | GET http://down.rxgif.cn/ddcfg/desk_info.ini |
request | GET http://xz.tq886.cn/ico/qsxg.ico |
request | POST http://tj.rxgif.cn/api/count/setup2 |
request | POST http://tj.rxgif.cn/api/count/setup2 |
name | RT_ICON | language | LANG_CHINESE | filetype | dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4286971018, next used block 4286774411 | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00041810 | size | 0x000025a8 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4286971018, next used block 4286774411 | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00041810 | size | 0x000025a8 | ||||||||||||||||||
name | RT_MENU | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00043db8 | size | 0x00000050 | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00043e08 | size | 0x00000128 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00043f30 | size | 0x00000046 | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00043f78 | size | 0x00000010 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00043f9c | size | 0x00000014 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00043f9c | size | 0x00000014 |
file | C:\Users\test22\Desktop\ÇáËÉÑø³ÉºÃÏ°¹ß.lnk |
file | C:\Users\test22\Desktop\ÇáËÉÑø³ÉºÃÏ°¹ß.lnk |
Lionic | Trojan.Win32.Doina.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Doina.21329 |
FireEye | Generic.mg.df46f7077499c629 |
ALYac | Gen:Variant.Doina.21329 |
Cylance | Unsafe |
Alibaba | Trojan:Win32/Generic.478f817c |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Generik.GMRYELG |
APEX | Malicious |
Paloalto | generic.ml |
BitDefender | Gen:Variant.Doina.21329 |
Avast | Win32:Trojan-gen |
Ad-Aware | Gen:Variant.Doina.21329 |
Sophos | Mal/Generic-S |
McAfee-GW-Edition | RDN/Generic.hbg |
Emsisoft | Gen:Variant.Doina.21329 (B) |
Webroot | W32.Trojan.Gen |
Gridinsoft | Trojan.Win32.Downloader.sa |
Microsoft | Trojan:Script/Phonzy.A!ml |
GData | Gen:Variant.Doina.21329 |
Cynet | Malicious (score: 100) |
McAfee | RDN/Generic.hbg |
MAX | malware (ai score=87) |
VBA32 | suspected of Trojan.Downloader.gen |
Malwarebytes | Malware.AI.4287017190 |
Ikarus | Trojan.SuspectCRC |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/PossibleThreat |
BitDefenderTheta | Gen:NN.ZexaF.34142.ruW@ay18pRcj |
AVG | Win32:Trojan-gen |
Cybereason | malicious.a93f23 |
Panda | Trj/GdSda.A |