Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 11, 2021, 9:53 a.m. | Oct. 11, 2021, 10:17 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
www.chevalsk.com | 104.195.48.226 | |
www.clairewashere.site | 209.17.116.163 | |
www.kaka.digital | ||
www.entitysystemsinc.com | ||
www.cristinamadara.com |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49207 -> 209.17.116.163:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49207 -> 209.17.116.163:80 | 2031449 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49207 -> 209.17.116.163:80 | 2031453 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49206 -> 104.195.48.226:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49206 -> 104.195.48.226:80 | 2031449 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49206 -> 104.195.48.226:80 | 2031453 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.chevalsk.com/nk6l/?ndiHKd=EaZkIt/dsbgGmtP3z3fG5X1OrV1k+ItimY3tDs5cepHzfg8Rj7GgJx6GdJ5RhaIBRqlzCCHC&1bj=jlK0MPU0w | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.clairewashere.site/nk6l/?ndiHKd=Dos/SRlugC4+vL8SY+lT6eayun6OXC9NQ0dHCaF9xdDTN/3HMO23XGTYqHWsARQsOO5DUhg+&1bj=jlK0MPU0w |
request | GET http://www.chevalsk.com/nk6l/?ndiHKd=EaZkIt/dsbgGmtP3z3fG5X1OrV1k+ItimY3tDs5cepHzfg8Rj7GgJx6GdJ5RhaIBRqlzCCHC&1bj=jlK0MPU0w |
request | GET http://www.clairewashere.site/nk6l/?ndiHKd=Dos/SRlugC4+vL8SY+lT6eayun6OXC9NQ0dHCaF9xdDTN/3HMO23XGTYqHWsARQsOO5DUhg+&1bj=jlK0MPU0w |
file | C:\Users\test22\AppData\Local\Temp\nsx63E4.tmp\nvmhx.dll |
file | C:\Users\test22\AppData\Local\Temp\nsx63E4.tmp\nvmhx.dll |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Multi.Generic.4!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
Cylance | Unsafe |
Arcabit | Trojan.NSISX.Spy.Gen.2 |
Cyren | W32/Agent.DML.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.EQGK |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.NSISX.Spy.Gen.2 |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.2 |
Sophos | Generic ML PUA (PUA) |
McAfee-GW-Edition | BehavesLike.Win32.AdwareDotDo.dc |
FireEye | Generic.mg.baf212e9711b33e1 |
Emsisoft | Trojan.NSISX.Spy.Gen.2 (B) |
Webroot | W32.Adware.Gen |
Kingsoft | Win32.Troj.Generic_a.a.(kcloud) |
Microsoft | Trojan:Win32/Formbook!MTB |
GData | Zum.Androm.1 |
McAfee | Artemis!BAF212E9711B |
MAX | malware (ai score=85) |
SentinelOne | Static AI - Malicious PE |
BitDefenderTheta | Gen:NN.ZedlaF.34170.bq4@au2FuHfi |