Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 15, 2021, 5:59 p.m. | Oct. 15, 2021, 6:06 p.m. |
-
1soft.exe "C:\Users\test22\AppData\Local\Temp\1soft.exe"
872
Name | Response | Post-Analysis Lookup |
---|---|---|
raw.githubusercontent.com | 185.199.108.133 | |
sanctam.net | ||
github.com | 52.78.231.108 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49201 -> 185.199.110.133:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49200 -> 15.164.81.167:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.101:49201 185.199.110.133:443 |
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA | C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=www.github.com | 70:94:de:dd:e6:c4:69:48:3a:92:70:a1:48:56:78:2d:18:64:e0:b7 |
TLS 1.2 192.168.56.101:49200 15.164.81.167:443 |
C=US, O=DigiCert, Inc., CN=DigiCert High Assurance TLS Hybrid ECC SHA256 2020 CA1 | C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=github.com | 84:63:b3:a9:29:12:cc:fd:1d:31:47:05:98:9b:ec:13:99:37:d0:d7 |
section | \xea\x99\xb0\xea\x99\xb0\xea\x99 |
resource name | MUI |
resource name | TYPELIB |
suspicious_features | GET method with no useragent header | suspicious_request | GET https://github.com/UnamSanctam/SilentETHMiner/raw/master/SilentETHMiner/Resources/ethminer.zip | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://raw.githubusercontent.com/UnamSanctam/SilentETHMiner/master/SilentETHMiner/Resources/ethminer.zip |
request | GET https://github.com/UnamSanctam/SilentETHMiner/raw/master/SilentETHMiner/Resources/ethminer.zip |
request | GET https://raw.githubusercontent.com/UnamSanctam/SilentETHMiner/master/SilentETHMiner/Resources/ethminer.zip |
section | {u'size_of_data': u'0x002ff200', u'virtual_address': u'0x0017e000', u'entropy': 7.74348936848591, u'name': u'\\xea\\x99\\xb0\\xea\\x99\\xb0\\xea\\x99', u'virtual_size': u'0x002ff0e8'} | entropy | 7.74348936849 | description | A section with a high entropy has been found | |||||||||
entropy | 0.909454653231 | description | Overall entropy of this PE file is high |
Lionic | Trojan.Win32.Generic.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.Autoruns.GenericKDS.37803180 |
McAfee | Artemis!6084BF88A6D2 |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_80% (W) |
Arcabit | Trojan.Autoruns.GenericS.D240D4AC |
ESET-NOD32 | a variant of Win32/GenCBL.AZL |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | Trojan.Win64.Donut.bvx |
BitDefender | Trojan.Autoruns.GenericKDS.37803180 |
Avast | Win64:MdeClass |
Ad-Aware | Trojan.Autoruns.GenericKDS.37803180 |
Emsisoft | Trojan.Autoruns.GenericKDS.37803180 (B) |
McAfee-GW-Edition | Artemis!Trojan |
FireEye | Generic.mg.6084bf88a6d2c70c |
Sophos | Mal/Generic-R |
Gridinsoft | Trojan.Win64.Sabsik.vb |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
ZoneAlarm | Trojan.Win64.Donut.bvx |
GData | MSIL.Malware.Coinminer.15OWS9 |
Cynet | Malicious (score: 100) |
MAX | malware (ai score=89) |
Ikarus | Win32.Outbreak |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | PossibleThreat.MU |
AVG | Win64:MdeClass |