Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 28, 2021, 11:03 a.m. | Oct. 28, 2021, 11:05 a.m. |
IP Address | Status | Action |
---|---|---|
120.79.70.33 | Active | Moloch |
136.143.191.204 | Active | Moloch |
150.95.114.233 | Active | Moloch |
156.240.146.122 | Active | Moloch |
164.124.101.2 | Active | Moloch |
182.50.132.242 | Active | Moloch |
199.59.242.153 | Active | Moloch |
208.100.26.245 | Active | Moloch |
34.102.136.180 | Active | Moloch |
70.39.125.244 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.thesugarlab.net/dnz9/?QFQLCr=Idvbba0MF/kQGajiPDQ0BtU9UR/6S6KzfrcT76qwTADBjDT6bieME1AfKGRXEiZr2N7zBOCu&Ppm=_6g8ydKhyJots | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.abcfortis.xyz/dnz9/?QFQLCr=6ARw2HGGhhFL65s6pXAsehEw9Mer1fUDUfAoyG+V2gKh2RiIiaVJinxsP2DtKoQDCx0xajlo&Ppm=_6g8ydKhyJots | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.larsonscompletewellness.com/dnz9/?QFQLCr=8j8o+Di1u89Hz5+B47P9M0QvjhZFDORnY21QyygQ+xvKvvmS9G92Q1wPTm7MWTiFk1+w4eYq&Ppm=_6g8ydKhyJots | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.socalsandblasting.com/dnz9/?QFQLCr=QAH/q537EU4COfkJHrxYUrzZOi4REe/2s1Jyid/oZOLuJwhlHmYPW7lT9qWjTIQA6SYMg92H&Ppm=_6g8ydKhyJots | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.into-mena.com/dnz9/?QFQLCr=3ag4vjOfnv+07s9FFiUkWtKgPKMLybE8jspBJRfAyAfqAQ9VBb/zfG2sx12s2MyOmLHLBCDV&Ppm=_6g8ydKhyJots | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.baileysepictravel.com/dnz9/?QFQLCr=HDBI6A2Z/73943MCk9C/o97/70OIUcVPSll2x6ZmH/+b2P8dW+s/leAF468MVaZaq4ChjF19&Ppm=_6g8ydKhyJots | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.sabanetavirtual.com/dnz9/?QFQLCr=ejJNf3mRMeUvMc8Yr9tYe4cGD1pDO9+FWVM0xq43/TzzIsMmcPf0XjBJWgLscL+X1SmA5CJh&Ppm=_6g8ydKhyJots | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.inn-oasis.com/dnz9/?QFQLCr=IW5PNwaHghlTf0xm0Ks5DYjbiqjHJ+X1K5m7YNZFSAp7YuTOcGAeqxTwTnc4OI/h7NapWfoM&Ppm=_6g8ydKhyJots | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.codelowenrangewwwdecimal.com/dnz9/?QFQLCr=pdBB9xDiriJfIw3kD921jAsii4fRl5Xta03FsCbmQDjV2BlGqNJh965M+1Yoo8YBTYzxVMHy&Ppm=_6g8ydKhyJots | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.44a44.net/dnz9/?QFQLCr=7zMqaysx3EtGjnss6reJQ0j+uTiQ8gwrgaQz0zIBfDQ+NTHovINuL2ZEGUn3O8dxlJ/AyyCs&Ppm=_6g8ydKhyJots | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.tentenno1.com/dnz9/?QFQLCr=C1OqYIG+srsEeKlYgjIZlxi155VbB51XW5Yk/rLmexTvMfK4GbE5kxIaHU1uJe6ZXofuLuUX&Ppm=_6g8ydKhyJots |
request | POST http://www.thesugarlab.net/dnz9/ |
request | GET http://www.thesugarlab.net/dnz9/?QFQLCr=Idvbba0MF/kQGajiPDQ0BtU9UR/6S6KzfrcT76qwTADBjDT6bieME1AfKGRXEiZr2N7zBOCu&Ppm=_6g8ydKhyJots |
request | POST http://www.abcfortis.xyz/dnz9/ |
request | GET http://www.abcfortis.xyz/dnz9/?QFQLCr=6ARw2HGGhhFL65s6pXAsehEw9Mer1fUDUfAoyG+V2gKh2RiIiaVJinxsP2DtKoQDCx0xajlo&Ppm=_6g8ydKhyJots |
request | POST http://www.larsonscompletewellness.com/dnz9/ |
request | GET http://www.larsonscompletewellness.com/dnz9/?QFQLCr=8j8o+Di1u89Hz5+B47P9M0QvjhZFDORnY21QyygQ+xvKvvmS9G92Q1wPTm7MWTiFk1+w4eYq&Ppm=_6g8ydKhyJots |
request | POST http://www.socalsandblasting.com/dnz9/ |
request | GET http://www.socalsandblasting.com/dnz9/?QFQLCr=QAH/q537EU4COfkJHrxYUrzZOi4REe/2s1Jyid/oZOLuJwhlHmYPW7lT9qWjTIQA6SYMg92H&Ppm=_6g8ydKhyJots |
request | POST http://www.into-mena.com/dnz9/ |
request | GET http://www.into-mena.com/dnz9/?QFQLCr=3ag4vjOfnv+07s9FFiUkWtKgPKMLybE8jspBJRfAyAfqAQ9VBb/zfG2sx12s2MyOmLHLBCDV&Ppm=_6g8ydKhyJots |
request | POST http://www.baileysepictravel.com/dnz9/ |
request | GET http://www.baileysepictravel.com/dnz9/?QFQLCr=HDBI6A2Z/73943MCk9C/o97/70OIUcVPSll2x6ZmH/+b2P8dW+s/leAF468MVaZaq4ChjF19&Ppm=_6g8ydKhyJots |
request | POST http://www.sabanetavirtual.com/dnz9/ |
request | GET http://www.sabanetavirtual.com/dnz9/?QFQLCr=ejJNf3mRMeUvMc8Yr9tYe4cGD1pDO9+FWVM0xq43/TzzIsMmcPf0XjBJWgLscL+X1SmA5CJh&Ppm=_6g8ydKhyJots |
request | POST http://www.inn-oasis.com/dnz9/ |
request | GET http://www.inn-oasis.com/dnz9/?QFQLCr=IW5PNwaHghlTf0xm0Ks5DYjbiqjHJ+X1K5m7YNZFSAp7YuTOcGAeqxTwTnc4OI/h7NapWfoM&Ppm=_6g8ydKhyJots |
request | POST http://www.codelowenrangewwwdecimal.com/dnz9/ |
request | GET http://www.codelowenrangewwwdecimal.com/dnz9/?QFQLCr=pdBB9xDiriJfIw3kD921jAsii4fRl5Xta03FsCbmQDjV2BlGqNJh965M+1Yoo8YBTYzxVMHy&Ppm=_6g8ydKhyJots |
request | POST http://www.44a44.net/dnz9/ |
request | GET http://www.44a44.net/dnz9/?QFQLCr=7zMqaysx3EtGjnss6reJQ0j+uTiQ8gwrgaQz0zIBfDQ+NTHovINuL2ZEGUn3O8dxlJ/AyyCs&Ppm=_6g8ydKhyJots |
request | POST http://www.tentenno1.com/dnz9/ |
request | GET http://www.tentenno1.com/dnz9/?QFQLCr=C1OqYIG+srsEeKlYgjIZlxi155VbB51XW5Yk/rLmexTvMfK4GbE5kxIaHU1uJe6ZXofuLuUX&Ppm=_6g8ydKhyJots |
request | POST http://www.thesugarlab.net/dnz9/ |
request | POST http://www.abcfortis.xyz/dnz9/ |
request | POST http://www.larsonscompletewellness.com/dnz9/ |
request | POST http://www.socalsandblasting.com/dnz9/ |
request | POST http://www.into-mena.com/dnz9/ |
request | POST http://www.baileysepictravel.com/dnz9/ |
request | POST http://www.sabanetavirtual.com/dnz9/ |
request | POST http://www.inn-oasis.com/dnz9/ |
request | POST http://www.codelowenrangewwwdecimal.com/dnz9/ |
request | POST http://www.44a44.net/dnz9/ |
request | POST http://www.tentenno1.com/dnz9/ |
file | C:\Users\test22\AppData\Local\Temp\nsv66C2.tmp\fejywy.dll |
file | C:\Users\test22\AppData\Local\Temp\nsv66C2.tmp\fejywy.dll |
Lionic | Trojan.Multi.Generic.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.37885158 |
Cylance | Unsafe |
Sangfor | Suspicious.Win32.Save.a |
K7AntiVirus | Trojan ( 005898461 ) |
Alibaba | Trojan:Win32/Zapchast.9fa7cb14 |
K7GW | Trojan ( 005898461 ) |
Cybereason | malicious.cfc228 |
Arcabit | Trojan.Nemesis.D6F1 |
Cyren | W32/Injector.AOE.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.EQKA |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.GenericKD.37885158 |
Avast | FileRepMalware |
Tencent | Win32.Trojan.Zapchast.Fhz |
Ad-Aware | Trojan.GenericKD.37885158 |
Sophos | Mal/Generic-S |
Comodo | fls.noname@0 |
DrWeb | Trojan.Packed2.43575 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.gc |
FireEye | Generic.mg.0e03abdcfc2280af |
Emsisoft | Trojan.GenericKD.37885158 (B) |
SentinelOne | Static AI - Suspicious PE |
Webroot | W32.Trojan.Gen |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Microsoft | Trojan:Win32/Tnega!ml |
GData | Win32.Trojan-Stealer.FormBook.UC3ZEE |
Cynet | Malicious (score: 100) |
McAfee | RDN/Generic.dx |
MAX | malware (ai score=100) |
Malwarebytes | Trojan.Injector |
TrendMicro-HouseCall | TROJ_GEN.R002H0DJR21 |
Ikarus | Win32.Outbreak |
Fortinet | W32/Injector.EQKA!tr |
AVG | FileRepMalware |
Panda | Trj/RnkBend.A |