Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 29, 2021, 10:57 a.m. | Sept. 29, 2021, 10:59 a.m. |
-
msiexec.exe "C:\Windows\System32\msiexec.exe" /I C:\Users\test22\AppData\Local\Temp\Document-753GF01.msi
2504 -
explorer.exe C:\Windows\Explorer.EXE
1924
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
Lionic | Trojan.Win32.Bulz.4!c |
ClamAV | Win.Downloader.Zusy-9884239-0 |
ALYac | Gen:Variant.Bulz.667805 |
Arcabit | Trojan.Bulz.DA309D |
Cyren | MSI/Banload.P |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Banload.YQS |
TrendMicro-HouseCall | TROJ_GEN.R002H0CIS21 |
Kaspersky | UDS:Backdoor.Multi.GenericML.xnet |
BitDefender | Gen:Variant.Zusy.402261 |
MicroWorld-eScan | Gen:Variant.Zusy.402261 |
F-Secure | Heuristic.HEUR/AGEN.1143862 |
FireEye | Gen:Variant.Zusy.402261 |
Emsisoft | Gen:Variant.Bulz.769458 (B) |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
GData | Gen:Variant.Zusy.402261 |
AhnLab-V3 | Trojan/Win.Generic.C4634343 |
McAfee | Artemis!A0AC7E39BD66 |
MAX | malware (ai score=84) |
VBA32 | BScope.Trojan.Click |
Zoner | Trojan.DOC.81465 |
Tencent | Win32.Trojan.Bulz.Htct |
Fortinet | W32/Banload.YQS!tr.dldr |