Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Oct. 8, 2021, 11:17 a.m. | Oct. 8, 2021, 11:32 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
www.poeticdaily.com |
CNAME
poeticdaily.com
|
34.102.136.180 |
www.olitusd.com | 54.251.187.76 | |
www.rthearts.com | 209.17.116.163 | |
www.patsanchezelpaso.com | ||
www.okdahotel.com |
CNAME
okdahotel.com
|
217.147.89.90 |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.olitusd.com/nk6l/?xh6pFFa8=A96J2yqZ15MRy9jQ1ShVttrHs3hZu5ufOYENCH+AED1FqV/nHh3IRBYvDz8bZEr5XGiorOrH&CR=CpCdU0E | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.rthearts.com/nk6l/?xh6pFFa8=aQJ/5obTpOHNVgnCvNgrcEt00DsX5EewgNz5JOfO7ljBuP/TG6sC4VyDa90vv4w4T6a/FBxt&CR=CpCdU0E | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.okdahotel.com/nk6l/?xh6pFFa8=7Cx7t3AZ2id/O6OwSSjkUz51aeTB+IK9J6vBgt2n544Oy/iasIcSWdfBUkGyM4lqaa8FXgYE&CR=CpCdU0E | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.poeticdaily.com/nk6l/?xh6pFFa8=rVD8+QajG6hBV5DMpuwEZ0RCKhEDH8x71UIWoVFRrcLN1VQdus1DI2AqPYOGAxFyY53e8M0A&CR=CpCdU0E |
request | GET http://www.olitusd.com/nk6l/?xh6pFFa8=A96J2yqZ15MRy9jQ1ShVttrHs3hZu5ufOYENCH+AED1FqV/nHh3IRBYvDz8bZEr5XGiorOrH&CR=CpCdU0E |
request | GET http://www.rthearts.com/nk6l/?xh6pFFa8=aQJ/5obTpOHNVgnCvNgrcEt00DsX5EewgNz5JOfO7ljBuP/TG6sC4VyDa90vv4w4T6a/FBxt&CR=CpCdU0E |
request | GET http://www.okdahotel.com/nk6l/?xh6pFFa8=7Cx7t3AZ2id/O6OwSSjkUz51aeTB+IK9J6vBgt2n544Oy/iasIcSWdfBUkGyM4lqaa8FXgYE&CR=CpCdU0E |
request | GET http://www.poeticdaily.com/nk6l/?xh6pFFa8=rVD8+QajG6hBV5DMpuwEZ0RCKhEDH8x71UIWoVFRrcLN1VQdus1DI2AqPYOGAxFyY53e8M0A&CR=CpCdU0E |
file | C:\Users\test22\AppData\Local\Temp\nso78D3.tmp\qztd.dll |
file | C:\Users\test22\AppData\Local\Temp\nso78D3.tmp\qztd.dll |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Win32.Malicious.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.2 |
FireEye | Generic.mg.27e82e5a6ba22fd1 |
McAfee | Artemis!27E82E5A6BA2 |
Cylance | Unsafe |
Cyren | W32/Injector.AMI.gen!Eldorado |
ESET-NOD32 | a variant of Win32/Injector.EQFS |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:Trojan-Spy.Win32.Noon.gen |
BitDefender | Trojan.NSISX.Spy.Gen.2 |
Emsisoft | Trojan.NSISX.Spy.Gen.2 (B) |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.dc |
Sophos | Mal/Generic-R |
Microsoft | Trojan:Win32/Formbook!MTB |
GData | Zum.Androm.1 |
Cynet | Malicious (score: 100) |
MAX | malware (ai score=80) |
SentinelOne | Static AI - Malicious PE |
Fortinet | W32/Injector.EQFJ!tr |
Cybereason | malicious.a6ba22 |
Panda | Trj/CI.A |