Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Oct. 11, 2021, 9:53 a.m. | Oct. 11, 2021, 9:59 a.m. |
IP Address | Status | Action |
---|---|---|
104.16.14.194 | Active | Moloch |
139.59.228.134 | Active | Moloch |
164.124.101.2 | Active | Moloch |
183.181.96.123 | Active | Moloch |
184.168.131.241 | Active | Moloch |
184.168.96.164 | Active | Moloch |
185.87.187.145 | Active | Moloch |
198.54.117.211 | Active | Moloch |
198.54.117.215 | Active | Moloch |
199.193.6.162 | Active | Moloch |
64.32.22.102 | Active | Moloch |
74.208.236.174 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ranbix.com/noha/?NvWHJt=WqlLRyxmklHBR9bvDjAAjeD09IEXqdmYERcw+cExScONqRgH/+tJNETkvgWEj3p7qMAbvI1j&1bj=jlK0MhVxt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.headlinebysmp.com/noha/?NvWHJt=ozWyOMXinaZwMUakYGHIPoMs5gZF5fcGvcEi2jjLRr0L8mOJllSpWkT4nhlbZ81Fu5Rkb7br&1bj=jlK0MhVxt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.llcmastermachine.com/noha/?NvWHJt=Cr7+FRPE36fJRNF+5kkCw9g1tnWsfV4otLCv7DCNGJQx9ElyDO+ayRlzaO2NWarxkvHU10eu&1bj=jlK0MhVxt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.paddlercentral.com/noha/?NvWHJt=BflZB6OqREwGJlb9Sk842/jtcaZ5fuiyOju/J2yjGs5y9yumeUh4rkZlJ2CmfPQeRsVHYWsh&1bj=jlK0MhVxt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.beauallenpoetry.com/noha/?NvWHJt=ceDwew5ozM+2tYIKmX5bctY7wq875Ed5vvDz8Yv10Jsktdi2pfgBVa05BRpFzyVFYnPslpoC&1bj=jlK0MhVxt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.groupninemed.com/noha/?NvWHJt=lvCRxprni/Iu4Xb0cYxnjQze0QPiFV0jDZ7jTVQcDsojxzhXqwn2iFqK753LFqKksQztMSnr&1bj=jlK0MhVxt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.mariadimitropoulou.com/noha/?NvWHJt=OpI7f+0Km3uF8QErh96y4UfCxqU+B78KM7iZg5orCNy4mHyPM1oOkE97tDp7RXQr0WnW8/Q8&1bj=jlK0MhVxt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.wkshops22012.xyz/noha/?NvWHJt=RebRg6mjS38HnQVFXuKaHIu5RFW1uZmRgUuld07QvOTPlsbmEhTTyuxWH3TxPNjfgX4h79Nk&1bj=jlK0MhVxt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.bonairemarathon.com/noha/?NvWHJt=CfFhcsmBnCLlkKf5ffInGLMZzIhhwlCqJPdqaYx0k1orYL70EHpmKvFIXv9rltq9xHJc66O3&1bj=jlK0MhVxt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.number-is-04.net/noha/?NvWHJt=533EpRLMvdGd3LnMjF6P5H4aqTXvZDN7WJAPd7m9vKZsB2Z3JtcedJpU+7lZs6mIB3YhcvB0&1bj=jlK0MhVxt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.simulatefuck.com/noha/?NvWHJt=3UR2uIfPulFdGcNwCm68yvPjTylt7u4HFjdICGqlfciJpq0vRWhT4BZscjCcYF3P85gFX7PT&1bj=jlK0MhVxt |
request | GET http://www.ranbix.com/noha/?NvWHJt=WqlLRyxmklHBR9bvDjAAjeD09IEXqdmYERcw+cExScONqRgH/+tJNETkvgWEj3p7qMAbvI1j&1bj=jlK0MhVxt |
request | GET http://www.headlinebysmp.com/noha/?NvWHJt=ozWyOMXinaZwMUakYGHIPoMs5gZF5fcGvcEi2jjLRr0L8mOJllSpWkT4nhlbZ81Fu5Rkb7br&1bj=jlK0MhVxt |
request | GET http://www.llcmastermachine.com/noha/?NvWHJt=Cr7+FRPE36fJRNF+5kkCw9g1tnWsfV4otLCv7DCNGJQx9ElyDO+ayRlzaO2NWarxkvHU10eu&1bj=jlK0MhVxt |
request | GET http://www.paddlercentral.com/noha/?NvWHJt=BflZB6OqREwGJlb9Sk842/jtcaZ5fuiyOju/J2yjGs5y9yumeUh4rkZlJ2CmfPQeRsVHYWsh&1bj=jlK0MhVxt |
request | GET http://www.beauallenpoetry.com/noha/?NvWHJt=ceDwew5ozM+2tYIKmX5bctY7wq875Ed5vvDz8Yv10Jsktdi2pfgBVa05BRpFzyVFYnPslpoC&1bj=jlK0MhVxt |
request | GET http://www.groupninemed.com/noha/?NvWHJt=lvCRxprni/Iu4Xb0cYxnjQze0QPiFV0jDZ7jTVQcDsojxzhXqwn2iFqK753LFqKksQztMSnr&1bj=jlK0MhVxt |
request | GET http://www.mariadimitropoulou.com/noha/?NvWHJt=OpI7f+0Km3uF8QErh96y4UfCxqU+B78KM7iZg5orCNy4mHyPM1oOkE97tDp7RXQr0WnW8/Q8&1bj=jlK0MhVxt |
request | GET http://www.wkshops22012.xyz/noha/?NvWHJt=RebRg6mjS38HnQVFXuKaHIu5RFW1uZmRgUuld07QvOTPlsbmEhTTyuxWH3TxPNjfgX4h79Nk&1bj=jlK0MhVxt |
request | GET http://www.bonairemarathon.com/noha/?NvWHJt=CfFhcsmBnCLlkKf5ffInGLMZzIhhwlCqJPdqaYx0k1orYL70EHpmKvFIXv9rltq9xHJc66O3&1bj=jlK0MhVxt |
request | GET http://www.number-is-04.net/noha/?NvWHJt=533EpRLMvdGd3LnMjF6P5H4aqTXvZDN7WJAPd7m9vKZsB2Z3JtcedJpU+7lZs6mIB3YhcvB0&1bj=jlK0MhVxt |
request | GET http://www.simulatefuck.com/noha/?NvWHJt=3UR2uIfPulFdGcNwCm68yvPjTylt7u4HFjdICGqlfciJpq0vRWhT4BZscjCcYF3P85gFX7PT&1bj=jlK0MhVxt |
file | C:\Users\test22\AppData\Local\Temp\nsa7C7D.tmp\rgcbbudham.dll |
file | C:\Users\test22\AppData\Local\Temp\nsa7C7D.tmp\rgcbbudham.dll |
Bkav | W32.AIDetect.malware2 |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.2 |
FireEye | Generic.mg.f3cfacb645a89642 |
Cylance | Unsafe |
BitDefender | Trojan.NSISX.Spy.Gen.2 |
Cybereason | malicious.645a89 |
Arcabit | Trojan.NSISX.Spy.Gen.2 |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Emsisoft | Trojan.NSISX.Spy.Gen.2 (B) |
McAfee-GW-Edition | BehavesLike.Win32.AdwareDotDo.dc |
Sophos | Generic ML PUA (PUA) |
SentinelOne | Static AI - Malicious PE |
Microsoft | Trojan:Win32/Tnega!ml |
GData | Zum.Androm.1 |
Cynet | Malicious (score: 100) |
MAX | malware (ai score=86) |
Ikarus | Trojan.NSIS.Agent |