Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 26, 2021, 9:54 a.m. | Oct. 26, 2021, 9:56 a.m. |
-
-
specification.exe "C:\Users\test22\AppData\Local\Temp\specification.exe"
2076
-
IP Address | Status | Action |
---|---|---|
107.180.41.49 | Active | Moloch |
154.208.173.129 | Active | Moloch |
164.124.101.2 | Active | Moloch |
184.168.96.211 | Active | Moloch |
192.0.78.24 | Active | Moloch |
198.54.117.210 | Active | Moloch |
198.54.117.244 | Active | Moloch |
213.186.33.5 | Active | Moloch |
34.102.136.180 | Active | Moloch |
34.80.190.141 | Active | Moloch |
66.45.250.214 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.agircredit.com/m5cw/?DhA83=pyQ/3Qovfc/RPZMCxW1OunUS9o/5gtBsSz/IO5NXG9CNMrfiYkJ8HHxCBG/KRbNCHZObSuIw&EzuxZr=3fX4qpLxsHG | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.limitlesschurchbf.com/m5cw/?DhA83=FJ7qf+03OJ299TaeGYRCEgZhI0FCy0KPlWjCSoUTV71bkUOf+2adFNNc+T1Jy75KmXZNbCqV&EzuxZr=3fX4qpLxsHG | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.art-for-a-cause.com/m5cw/?DhA83=J8VJ8UCC0khwQJPb8jXSgpuDN+WtvXxDYaYel8rzuxdPQ32TBsL8hQV0C7xWeQV4TeCDFs/g&EzuxZr=3fX4qpLxsHG | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.classificationmetallurgie.com/m5cw/?DhA83=/JTTvVUTsa8Y0xLO6KtGC+8GgnhRVvgk70AJBJ4TlCs6p2eL5EP4A9DynmjO2wjoVGTCezE4&EzuxZr=3fX4qpLxsHG | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.grippyent.com/m5cw/?DhA83=i4icWyR5Y9i2t0xbz2p0H2L6OJRLVM0eNrDAHmVfjhFHrzfGIW3vf7ZP4pCLEbHBwypZOUqc&EzuxZr=3fX4qpLxsHG | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.byrdemailplans.xyz/m5cw/?DhA83=c7feWHcm0LII4MK/sCK1JbYS7bcjHAYM2455Rh7sTmKPwd3owB2HX887+DCt26EIPFNWBKVP&EzuxZr=3fX4qpLxsHG | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.customsoftwarelogistics.com/m5cw/?DhA83=+S8mLshjf5hvUDGw0RmMlmkW9vRy5Hz2J+O5LZqlmuEIOFnlku0LQHz9Sw/RJOPoOd8q5Iza&EzuxZr=3fX4qpLxsHG | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.runawaypklyau.xyz/m5cw/?DhA83=5Bv/JLUtJrKO/9gZnmFexZq+Xed7eHY5Ibz4cfGRYXJLjLoDi3CrUEok8Uzan4zmfs4GZz2f&EzuxZr=3fX4qpLxsHG | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.wuruixin.com/m5cw/?DhA83=0EeHxnJ+lNU4xFJNfOARrzBQsLlykirUfGVKXlUPhiG1Vhwkxb1PbSgC0MAJvHsVsTmDYrcN&EzuxZr=3fX4qpLxsHG | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.the22yards.club/m5cw/?DhA83=emMSuu7GUcaDa4Oo/eoU+baJRAHOsrVhqwxc30o52Oy/Uh4TjPMUhzrdSct0qi37V/+TpRYI&EzuxZr=3fX4qpLxsHG |
request | POST http://www.agircredit.com/m5cw/ |
request | GET http://www.agircredit.com/m5cw/?DhA83=pyQ/3Qovfc/RPZMCxW1OunUS9o/5gtBsSz/IO5NXG9CNMrfiYkJ8HHxCBG/KRbNCHZObSuIw&EzuxZr=3fX4qpLxsHG |
request | POST http://www.limitlesschurchbf.com/m5cw/ |
request | GET http://www.limitlesschurchbf.com/m5cw/?DhA83=FJ7qf+03OJ299TaeGYRCEgZhI0FCy0KPlWjCSoUTV71bkUOf+2adFNNc+T1Jy75KmXZNbCqV&EzuxZr=3fX4qpLxsHG |
request | POST http://www.art-for-a-cause.com/m5cw/ |
request | GET http://www.art-for-a-cause.com/m5cw/?DhA83=J8VJ8UCC0khwQJPb8jXSgpuDN+WtvXxDYaYel8rzuxdPQ32TBsL8hQV0C7xWeQV4TeCDFs/g&EzuxZr=3fX4qpLxsHG |
request | POST http://www.classificationmetallurgie.com/m5cw/ |
request | GET http://www.classificationmetallurgie.com/m5cw/?DhA83=/JTTvVUTsa8Y0xLO6KtGC+8GgnhRVvgk70AJBJ4TlCs6p2eL5EP4A9DynmjO2wjoVGTCezE4&EzuxZr=3fX4qpLxsHG |
request | POST http://www.grippyent.com/m5cw/ |
request | GET http://www.grippyent.com/m5cw/?DhA83=i4icWyR5Y9i2t0xbz2p0H2L6OJRLVM0eNrDAHmVfjhFHrzfGIW3vf7ZP4pCLEbHBwypZOUqc&EzuxZr=3fX4qpLxsHG |
request | POST http://www.byrdemailplans.xyz/m5cw/ |
request | GET http://www.byrdemailplans.xyz/m5cw/?DhA83=c7feWHcm0LII4MK/sCK1JbYS7bcjHAYM2455Rh7sTmKPwd3owB2HX887+DCt26EIPFNWBKVP&EzuxZr=3fX4qpLxsHG |
request | POST http://www.customsoftwarelogistics.com/m5cw/ |
request | GET http://www.customsoftwarelogistics.com/m5cw/?DhA83=+S8mLshjf5hvUDGw0RmMlmkW9vRy5Hz2J+O5LZqlmuEIOFnlku0LQHz9Sw/RJOPoOd8q5Iza&EzuxZr=3fX4qpLxsHG |
request | POST http://www.runawaypklyau.xyz/m5cw/ |
request | GET http://www.runawaypklyau.xyz/m5cw/?DhA83=5Bv/JLUtJrKO/9gZnmFexZq+Xed7eHY5Ibz4cfGRYXJLjLoDi3CrUEok8Uzan4zmfs4GZz2f&EzuxZr=3fX4qpLxsHG |
request | POST http://www.wuruixin.com/m5cw/ |
request | GET http://www.wuruixin.com/m5cw/?DhA83=0EeHxnJ+lNU4xFJNfOARrzBQsLlykirUfGVKXlUPhiG1Vhwkxb1PbSgC0MAJvHsVsTmDYrcN&EzuxZr=3fX4qpLxsHG |
request | POST http://www.the22yards.club/m5cw/ |
request | GET http://www.the22yards.club/m5cw/?DhA83=emMSuu7GUcaDa4Oo/eoU+baJRAHOsrVhqwxc30o52Oy/Uh4TjPMUhzrdSct0qi37V/+TpRYI&EzuxZr=3fX4qpLxsHG |
request | POST http://www.agircredit.com/m5cw/ |
request | POST http://www.limitlesschurchbf.com/m5cw/ |
request | POST http://www.art-for-a-cause.com/m5cw/ |
request | POST http://www.classificationmetallurgie.com/m5cw/ |
request | POST http://www.grippyent.com/m5cw/ |
request | POST http://www.byrdemailplans.xyz/m5cw/ |
request | POST http://www.customsoftwarelogistics.com/m5cw/ |
request | POST http://www.runawaypklyau.xyz/m5cw/ |
request | POST http://www.wuruixin.com/m5cw/ |
request | POST http://www.the22yards.club/m5cw/ |
file | C:\Users\test22\AppData\Local\Temp\nst62DA.tmp\ztqv.dll |
file | C:\Users\test22\AppData\Local\Temp\nst62DA.tmp\ztqv.dll |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.4 |
FireEye | Generic.mg.371c76d36256463a |
Cylance | Unsafe |
Sangfor | Suspicious.Win32.Save.a |
Cybereason | malicious.362564 |
Arcabit | Zum.Androm.1 |
Cyren | W32/Injector.AMS.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.EQIQ |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.NSISX.Spy.Gen.4 |
Emsisoft | Trojan.NSISX.Spy.Gen.4 (B) |
F-Secure | Trojan.TR/Crypt.ZPACK.Gen |
McAfee-GW-Edition | BehavesLike.Win32.Vopak.dc |
Sophos | Generic ML PUA (PUA) |
SentinelOne | Static AI - Malicious PE |
Avira | TR/Crypt.ZPACK.Gen |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Zum.Androm.1 |
Cynet | Malicious (score: 100) |
MAX | malware (ai score=85) |
Malwarebytes | Trojan.Injector |
Ikarus | Trojan.NSIS.Agent |
Fortinet | W32/Injector_AGen.AW!tr |