Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 5, 2021, 5:45 p.m. | Oct. 5, 2021, 6:03 p.m. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
166.88.19.181 | Active | Moloch |
168.76.29.184 | Active | Moloch |
182.50.132.242 | Active | Moloch |
184.168.131.241 | Active | Moloch |
198.54.117.212 | Active | Moloch |
2.57.90.16 | Active | Moloch |
203.170.80.250 | Active | Moloch |
209.17.116.163 | Active | Moloch |
34.102.136.180 | Active | Moloch |
72.167.241.180 | Active | Moloch |
74.208.236.228 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.colonelabrams.com/pusp/?xVJtG4Th=GpOemIVbAEkRtcZWG0w6ZY9t/Kj0kHMZJUri0oAYzPXxYIlKghPFhBLyPyQ6wS25kQBXaNQK&1bw=L6Adp0uXjfuLdDA0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.georgialogisticscontractors.com/pusp/?xVJtG4Th=uXFBoWTbwpRe3QPmrmmdA8fVM1sPFIdCr4IpmJZcwBKKd8ZRxWIMBxwaKrU120JbOkE11jfq&1bw=L6Adp0uXjfuLdDA0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fanaticscardgroup.com/pusp/?xVJtG4Th=LcRe9pjN5Gb8pjGdHIWKy0hSBOjCts21Z8mM0bPkxuRl55vVFJrqur5aeHJ3ehnhmvvyB+PF&1bw=L6Adp0uXjfuLdDA0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fieldsauction.online/pusp/?xVJtG4Th=VrWe0xVr9ux9Mcv5Ey2q6vLJLLqsoVD/pcwJdQ9af4hJVfahtpaWhvXjPrPh/9jB4zO7QS6q&1bw=L6Adp0uXjfuLdDA0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ez8-pay.com/pusp/?xVJtG4Th=WjGeI7p1H4+/S9Zuvg4I2DZNA92GuQJFuoH+crR+gUAo1tApr80Jm27CU4T9SRDjyVSBKp3E&1bw=L6Adp0uXjfuLdDA0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.morgsanusa.com/pusp/?xVJtG4Th=/Fjax9oi/YhlDG4ZDyfPMUGG3veF+C45tP1S8dUcdfoMjlb2IAI5B23eH5djDsayMc3auOGa&1bw=L6Adp0uXjfuLdDA0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.nm-ent.com/pusp/?xVJtG4Th=QKlvSsq1g3ywZ5RJgqHKfBX77rwF+3OkPjfWtJrcAgJEUgRrzskrjCLYXcfubbSsfkZBuGOB&1bw=L6Adp0uXjfuLdDA0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.geemove.com/pusp/?xVJtG4Th=2U8gML9VR2lXg8r2cxwKt3kTtYK9n+QtiPzqfiX0r0tg/nEfsGYGs5OQxuADyIoex9ZgHdg6&1bw=L6Adp0uXjfuLdDA0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.advancedautoair.repair/pusp/?xVJtG4Th=nmJFn5gWHgR85O5qeMhC8SY2AOi9nxjXr1zOp9/mLaHLfpEZyMhYyybAfbJv5rCssjX9d6Xn&1bw=L6Adp0uXjfuLdDA0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.dhgjjtq.com/pusp/?xVJtG4Th=F7NxiRsX9aeJ/xS6ytSC95ekg6G+Iab4R7P/P6ebpmQyNfgbdryclrgzZKUl+RJmXhHCbEcs&1bw=L6Adp0uXjfuLdDA0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.usfiltros.com/pusp/?xVJtG4Th=8j5ZDxP5Kjr1GqC+NJhJWhBuUGifdIvct6dCH9aw24IiMW6kEE6uvcqT9EmS++Kc3UzZ5CjP&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.colonelabrams.com/pusp/ |
request | GET http://www.colonelabrams.com/pusp/?xVJtG4Th=GpOemIVbAEkRtcZWG0w6ZY9t/Kj0kHMZJUri0oAYzPXxYIlKghPFhBLyPyQ6wS25kQBXaNQK&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.georgialogisticscontractors.com/pusp/ |
request | GET http://www.georgialogisticscontractors.com/pusp/?xVJtG4Th=uXFBoWTbwpRe3QPmrmmdA8fVM1sPFIdCr4IpmJZcwBKKd8ZRxWIMBxwaKrU120JbOkE11jfq&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.fanaticscardgroup.com/pusp/ |
request | GET http://www.fanaticscardgroup.com/pusp/?xVJtG4Th=LcRe9pjN5Gb8pjGdHIWKy0hSBOjCts21Z8mM0bPkxuRl55vVFJrqur5aeHJ3ehnhmvvyB+PF&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.fieldsauction.online/pusp/ |
request | GET http://www.fieldsauction.online/pusp/?xVJtG4Th=VrWe0xVr9ux9Mcv5Ey2q6vLJLLqsoVD/pcwJdQ9af4hJVfahtpaWhvXjPrPh/9jB4zO7QS6q&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.ez8-pay.com/pusp/ |
request | GET http://www.ez8-pay.com/pusp/?xVJtG4Th=WjGeI7p1H4+/S9Zuvg4I2DZNA92GuQJFuoH+crR+gUAo1tApr80Jm27CU4T9SRDjyVSBKp3E&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.morgsanusa.com/pusp/ |
request | GET http://www.morgsanusa.com/pusp/?xVJtG4Th=/Fjax9oi/YhlDG4ZDyfPMUGG3veF+C45tP1S8dUcdfoMjlb2IAI5B23eH5djDsayMc3auOGa&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.nm-ent.com/pusp/ |
request | GET http://www.nm-ent.com/pusp/?xVJtG4Th=QKlvSsq1g3ywZ5RJgqHKfBX77rwF+3OkPjfWtJrcAgJEUgRrzskrjCLYXcfubbSsfkZBuGOB&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.geemove.com/pusp/ |
request | GET http://www.geemove.com/pusp/?xVJtG4Th=2U8gML9VR2lXg8r2cxwKt3kTtYK9n+QtiPzqfiX0r0tg/nEfsGYGs5OQxuADyIoex9ZgHdg6&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.advancedautoair.repair/pusp/ |
request | GET http://www.advancedautoair.repair/pusp/?xVJtG4Th=nmJFn5gWHgR85O5qeMhC8SY2AOi9nxjXr1zOp9/mLaHLfpEZyMhYyybAfbJv5rCssjX9d6Xn&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.dhgjjtq.com/pusp/ |
request | GET http://www.dhgjjtq.com/pusp/?xVJtG4Th=F7NxiRsX9aeJ/xS6ytSC95ekg6G+Iab4R7P/P6ebpmQyNfgbdryclrgzZKUl+RJmXhHCbEcs&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.usfiltros.com/pusp/ |
request | GET http://www.usfiltros.com/pusp/?xVJtG4Th=8j5ZDxP5Kjr1GqC+NJhJWhBuUGifdIvct6dCH9aw24IiMW6kEE6uvcqT9EmS++Kc3UzZ5CjP&1bw=L6Adp0uXjfuLdDA0 |
request | POST http://www.colonelabrams.com/pusp/ |
request | POST http://www.georgialogisticscontractors.com/pusp/ |
request | POST http://www.fanaticscardgroup.com/pusp/ |
request | POST http://www.fieldsauction.online/pusp/ |
request | POST http://www.ez8-pay.com/pusp/ |
request | POST http://www.morgsanusa.com/pusp/ |
request | POST http://www.nm-ent.com/pusp/ |
request | POST http://www.geemove.com/pusp/ |
request | POST http://www.advancedautoair.repair/pusp/ |
request | POST http://www.dhgjjtq.com/pusp/ |
request | POST http://www.usfiltros.com/pusp/ |
file | C:\Users\test22\AppData\Local\Temp\nsn6432.tmp\sujtihuutte.dll |
file | C:\Users\test22\AppData\Local\Temp\nsn6432.tmp\sujtihuutte.dll |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Win32.Malicious.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Zum.Androm.1 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
Cybereason | malicious.d4ba71 |
Arcabit | Zum.Androm.1 |
BitDefenderTheta | Gen:NN.ZedlaF.34170.bu4@aO2hfrmi |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.EQFJ |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Zum.Androm.1 |
Avast | FileRepMalware |
Sophos | Mal/Generic-S |
McAfee-GW-Edition | BehavesLike.Win32.VTFlooder.dc |
FireEye | Generic.mg.7e17686d4ba718b4 |
Emsisoft | Zum.Androm.1 (B) |
SentinelOne | Static AI - Malicious PE |
Avira | TR/Crypt.ZPACK.Gen |
MAX | malware (ai score=85) |
Microsoft | Trojan:Script/Phonzy.B!ml |
GData | Zum.Androm.1 |
Cynet | Malicious (score: 100) |
McAfee | Artemis!7E17686D4BA7 |
TrendMicro-HouseCall | TROJ_GEN.R002H0DJ421 |
AVG | FileRepMalware |