Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 14, 2021, 3:17 p.m. | Oct. 14, 2021, 3:21 p.m. |
IP Address | Status | Action |
---|---|---|
118.27.122.218 | Active | Moloch |
154.208.173.49 | Active | Moloch |
164.124.101.2 | Active | Moloch |
184.164.70.9 | Active | Moloch |
185.53.179.94 | Active | Moloch |
208.91.197.91 | Active | Moloch |
23.227.38.74 | Active | Moloch |
34.102.136.180 | Active | Moloch |
35.214.244.56 | Active | Moloch |
37.123.118.150 | Active | Moloch |
89.31.143.1 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.redherring.agency/hr8n/?MZg8=Msb0E+nHxXTk+kRHU817jyd7jk0ZtYL78GCylVtt06iZTpAscdQZhKi5jYPsypr0fRcRxBIc&uTxXo=ojOPdxR8gB | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.libbybruce.space/hr8n/?MZg8=tvOOJymLPTo+u55ddd5JgP/eYwawdK1IFhff86iTT/s0UFVHuQ3vbuf5ifvAKeBftP33/qgK&uTxXo=ojOPdxR8gB | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.bercatv.com/hr8n/?MZg8=/yRRgDSwLMsWxKA4f5KuELmjy/mqUWJqcFQmTFbv5od3MFYL2Xoy8Nze6PPGHjgxg3JBbnV1&uTxXo=ojOPdxR8gB | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.suvsangebotguenstigdeorg.com/hr8n/?MZg8=0uz0Q17Sfx93I9QMDgfv2FcHKGK5h9rfNO4V9s+zrmjnR/7GYJXF1g44bJEkuz64Y6KiX6Qm&uTxXo=ojOPdxR8gB | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.chatelab.network/hr8n/?MZg8=3oN9XgLBJtDXNs2zngQn2dVK6Uxi1QAVFf1LLML5AQ9srmgBfwUts4HpZdFn/GyEF4+HDuxo&uTxXo=ojOPdxR8gB | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.pochi-owarai.com/hr8n/?MZg8=wgLDzEI7JM5HW3UGruAf3rNm8/j8NE+Zr86Wwng2vxqt30foW8WvIulUjY9BDwGT0AcSiOsT&uTxXo=ojOPdxR8gB | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.mudatstudio.com/hr8n/?MZg8=gUaQ/+3s/kFGf10Bdd8lj7WBkIz9GsQxMveD/qPqZzJE0ReW2q5Df9vdRW11VznkrH2iE1ue&uTxXo=ojOPdxR8gB | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.secure01bchslogin.com/hr8n/?MZg8=/xCQRyoVMWVnh23tRG8vfAMo2MFBA+pRIDM06yAvE/Fg6D1CIShQVBVEbqNYVVAHcuTqles7&uTxXo=ojOPdxR8gB | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.baumer-instruments.com/hr8n/?MZg8=q42LDbLer29Q12jt65bKw12quuQGKu9GNRKcDfylwoI+Av0krotLDNZCIm4LxOiWVzWcVna9&uTxXo=ojOPdxR8gB | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.apnagas.com/hr8n/?MZg8=pMGdtUWSDrqidj5eJ3dEayK/o6OFfDVrqiV5PnaA2tMYsbhRHtR8TpoDkey3LlwoIKw9ab9x&uTxXo=ojOPdxR8gB |
request | POST http://www.redherring.agency/hr8n/ |
request | GET http://www.redherring.agency/hr8n/?MZg8=Msb0E+nHxXTk+kRHU817jyd7jk0ZtYL78GCylVtt06iZTpAscdQZhKi5jYPsypr0fRcRxBIc&uTxXo=ojOPdxR8gB |
request | POST http://www.libbybruce.space/hr8n/ |
request | GET http://www.libbybruce.space/hr8n/?MZg8=tvOOJymLPTo+u55ddd5JgP/eYwawdK1IFhff86iTT/s0UFVHuQ3vbuf5ifvAKeBftP33/qgK&uTxXo=ojOPdxR8gB |
request | POST http://www.bercatv.com/hr8n/ |
request | GET http://www.bercatv.com/hr8n/?MZg8=/yRRgDSwLMsWxKA4f5KuELmjy/mqUWJqcFQmTFbv5od3MFYL2Xoy8Nze6PPGHjgxg3JBbnV1&uTxXo=ojOPdxR8gB |
request | POST http://www.suvsangebotguenstigdeorg.com/hr8n/ |
request | GET http://www.suvsangebotguenstigdeorg.com/hr8n/?MZg8=0uz0Q17Sfx93I9QMDgfv2FcHKGK5h9rfNO4V9s+zrmjnR/7GYJXF1g44bJEkuz64Y6KiX6Qm&uTxXo=ojOPdxR8gB |
request | POST http://www.chatelab.network/hr8n/ |
request | GET http://www.chatelab.network/hr8n/?MZg8=3oN9XgLBJtDXNs2zngQn2dVK6Uxi1QAVFf1LLML5AQ9srmgBfwUts4HpZdFn/GyEF4+HDuxo&uTxXo=ojOPdxR8gB |
request | POST http://www.pochi-owarai.com/hr8n/ |
request | GET http://www.pochi-owarai.com/hr8n/?MZg8=wgLDzEI7JM5HW3UGruAf3rNm8/j8NE+Zr86Wwng2vxqt30foW8WvIulUjY9BDwGT0AcSiOsT&uTxXo=ojOPdxR8gB |
request | POST http://www.saamcoheir.quest/hr8n/ |
request | POST http://www.mudatstudio.com/hr8n/ |
request | GET http://www.mudatstudio.com/hr8n/?MZg8=gUaQ/+3s/kFGf10Bdd8lj7WBkIz9GsQxMveD/qPqZzJE0ReW2q5Df9vdRW11VznkrH2iE1ue&uTxXo=ojOPdxR8gB |
request | POST http://www.secure01bchslogin.com/hr8n/ |
request | GET http://www.secure01bchslogin.com/hr8n/?MZg8=/xCQRyoVMWVnh23tRG8vfAMo2MFBA+pRIDM06yAvE/Fg6D1CIShQVBVEbqNYVVAHcuTqles7&uTxXo=ojOPdxR8gB |
request | POST http://www.baumer-instruments.com/hr8n/ |
request | GET http://www.baumer-instruments.com/hr8n/?MZg8=q42LDbLer29Q12jt65bKw12quuQGKu9GNRKcDfylwoI+Av0krotLDNZCIm4LxOiWVzWcVna9&uTxXo=ojOPdxR8gB |
request | POST http://www.apnagas.com/hr8n/ |
request | GET http://www.apnagas.com/hr8n/?MZg8=pMGdtUWSDrqidj5eJ3dEayK/o6OFfDVrqiV5PnaA2tMYsbhRHtR8TpoDkey3LlwoIKw9ab9x&uTxXo=ojOPdxR8gB |
request | POST http://www.redherring.agency/hr8n/ |
request | POST http://www.libbybruce.space/hr8n/ |
request | POST http://www.bercatv.com/hr8n/ |
request | POST http://www.suvsangebotguenstigdeorg.com/hr8n/ |
request | POST http://www.chatelab.network/hr8n/ |
request | POST http://www.pochi-owarai.com/hr8n/ |
request | POST http://www.saamcoheir.quest/hr8n/ |
request | POST http://www.mudatstudio.com/hr8n/ |
request | POST http://www.secure01bchslogin.com/hr8n/ |
request | POST http://www.baumer-instruments.com/hr8n/ |
request | POST http://www.apnagas.com/hr8n/ |
file | C:\Users\test22\AppData\Local\Temp\nsw649F.tmp\olzh.dll |
file | C:\Users\test22\AppData\Local\Temp\nsw649F.tmp\olzh.dll |
dead_host | 192.168.56.101:49209 |
Elastic | malicious (high confidence) |
DrWeb | Trojan.Packed2.43499 |
MicroWorld-eScan | Trojan.GenericKD.37781474 |
FireEye | Generic.mg.31ce7d8522a4ee3b |
Cylance | Unsafe |
Sangfor | Spyware.Win32.Noon.gen |
Alibaba | TrojanSpy:Win32/Injector.7632d343 |
K7GW | Riskware ( 00584baa1 ) |
Cyren | W32/Injector.ANC.gen!Eldorado |
ESET-NOD32 | a variant of Win32/Injector.EQHK |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-Spy.Win32.Noon.gen |
BitDefender | Trojan.GenericKD.37781474 |
Avast | FileRepMalware |
Ad-Aware | Trojan.GenericKD.37781474 |
Sophos | Mal/Generic-S |
McAfee-GW-Edition | BehavesLike.Win32.ICLoader.dc |
Emsisoft | Trojan.GenericKD.37781474 (B) |
SentinelOne | Static AI - Malicious PE |
GData | Trojan.GenericKD.37781474 |
Avira | TR/AD.Swotter.dcjlo |
MAX | malware (ai score=100) |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Microsoft | Trojan:Win32/Formbook.AT!MTB |
Cynet | Malicious (score: 100) |
McAfee | RDN/Generic |
Malwarebytes | Trojan.Injector.DL |
TrendMicro-HouseCall | TROJ_GEN.R002H0DJD21 |
Ikarus | Trojan.NSIS.Agent |
Fortinet | W32/Injector.ANC!tr |
Webroot | W32.Malware.Gen |
AVG | FileRepMalware |
Panda | Trj/CI.A |