Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 29, 2021, 9:26 a.m. | Oct. 29, 2021, 9:49 a.m. |
-
-
loader1.exe "C:\Users\test22\AppData\Local\Temp\loader1.exe"
2244
-
IP Address | Status | Action |
---|---|---|
104.233.161.7 | Active | Moloch |
107.180.0.6 | Active | Moloch |
143.95.1.174 | Active | Moloch |
164.124.101.2 | Active | Moloch |
23.227.38.74 | Active | Moloch |
23.230.206.51 | Active | Moloch |
3.223.115.185 | Active | Moloch |
3.64.163.50 | Active | Moloch |
34.102.136.180 | Active | Moloch |
34.98.99.30 | Active | Moloch |
43.129.169.28 | Active | Moloch |
88.214.207.96 | Active | Moloch |
89.191.148.30 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.egyptian-museum.com/ga6b/?lDKXxv3=CYKd0A9ffzzmh+HMixfnmJt+Ibe3PgwQT1IowcrJSMkSzDwRXwABXy8G05QumwrEDOfj2gVO&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.szkoleniawcag.online/ga6b/?lDKXxv3=gnsA4ZbKwcCBT4B1BZOwnz85wF4eeNbRrbSFWu41EJQIcvRDWo1d+7UOhMG+MofppSWBY2n5&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.gritzcharlestonluxuryinn.store/ga6b/?lDKXxv3=I7+lOFJZANFPU21x37A527c95H/aJlATolxoDPbL88ZB7wUaWO1fPidq8y9dbqc40d5vraaW&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.nobodybutgod.com/ga6b/?lDKXxv3=BS+Mkr60hnaz2VUqn6F4jElENEwbATWztr1txOlCDy4YTJ8rldrX7GuvTHEqc04l9LT0WVoV&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.afghantattoos.com/ga6b/?lDKXxv3=2Ru1HfNJkzg9zqDfItmBkvjjxlVS0LNfThNY9X9fgrCeE16wu3v6AqM2D0FDDG0AnjNX5uQ/&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.mystudentregistration.com/ga6b/?lDKXxv3=FVoCe1A8hVjRCYMBrNnCX0kDnu+C161o3wWxJxzL6alfMQ3NhDSyui/P1g/HSSLfHx6+Mmre&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.corvusexpeditii.xyz/ga6b/?lDKXxv3=7T8vebYEf2GnHvqeOh/0TgFFgNzfckxTcBNzZeSGzjlNLlbJ9NDPNSTqSdLNqh5j9wLWy4Dd&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.qqcx666888.top/ga6b/?lDKXxv3=eIOqojsK4xpnapytTTDNeQQlEQNyaN45Mu2frT25CMa88Pt4x/OA2saBEpBSOPq2dGKSSZM3&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.belledescontos.com/ga6b/?lDKXxv3=jgYBUTBv6juzDCabe4OWCqutfSnVgXfaFkkijkSn/1f1jJLEA2ITjcU5AEV22xDLWIcCZZOm&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.onra.top/ga6b/?lDKXxv3=oElzuWp1f34WuFFQH0ElFrJlzB2XRtqeKiQMWTUoMD39vhgZ+y+e3BJkM1IQMs1XY69eCkQ6&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.soulwinningministry.com/ga6b/?lDKXxv3=QlWlhrdmA38F39wdH59qDKgCLzke0jtbLkghOfWKUCAF1Rx/+ASUr0tJhxHvOSZs2DWzt0F9&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.infinityrope.store/ga6b/?lDKXxv3=L/c9eZQCXLd/YVoAQOP3tZ3B8nNkn+pww7YQb0Xhol9/59b8TqV7CKFWTb/5H/3WmVOflfic&Kzux=PnjtLHyHSr | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.acacave.com/ga6b/?lDKXxv3=LZj7dIufhWlgov4/daUw8E4ZVYKGDHaQ4e5klmj4Sj863sAeUYBdGT0Z9uhDs1Zyx3HrxG1c&Kzux=PnjtLHyHSr |
request | POST http://www.egyptian-museum.com/ga6b/ |
request | GET http://www.egyptian-museum.com/ga6b/?lDKXxv3=CYKd0A9ffzzmh+HMixfnmJt+Ibe3PgwQT1IowcrJSMkSzDwRXwABXy8G05QumwrEDOfj2gVO&Kzux=PnjtLHyHSr |
request | POST http://www.szkoleniawcag.online/ga6b/ |
request | GET http://www.szkoleniawcag.online/ga6b/?lDKXxv3=gnsA4ZbKwcCBT4B1BZOwnz85wF4eeNbRrbSFWu41EJQIcvRDWo1d+7UOhMG+MofppSWBY2n5&Kzux=PnjtLHyHSr |
request | POST http://www.gritzcharlestonluxuryinn.store/ga6b/ |
request | GET http://www.gritzcharlestonluxuryinn.store/ga6b/?lDKXxv3=I7+lOFJZANFPU21x37A527c95H/aJlATolxoDPbL88ZB7wUaWO1fPidq8y9dbqc40d5vraaW&Kzux=PnjtLHyHSr |
request | POST http://www.nobodybutgod.com/ga6b/ |
request | GET http://www.nobodybutgod.com/ga6b/?lDKXxv3=BS+Mkr60hnaz2VUqn6F4jElENEwbATWztr1txOlCDy4YTJ8rldrX7GuvTHEqc04l9LT0WVoV&Kzux=PnjtLHyHSr |
request | POST http://www.afghantattoos.com/ga6b/ |
request | GET http://www.afghantattoos.com/ga6b/?lDKXxv3=2Ru1HfNJkzg9zqDfItmBkvjjxlVS0LNfThNY9X9fgrCeE16wu3v6AqM2D0FDDG0AnjNX5uQ/&Kzux=PnjtLHyHSr |
request | POST http://www.mystudentregistration.com/ga6b/ |
request | GET http://www.mystudentregistration.com/ga6b/?lDKXxv3=FVoCe1A8hVjRCYMBrNnCX0kDnu+C161o3wWxJxzL6alfMQ3NhDSyui/P1g/HSSLfHx6+Mmre&Kzux=PnjtLHyHSr |
request | POST http://www.corvusexpeditii.xyz/ga6b/ |
request | GET http://www.corvusexpeditii.xyz/ga6b/?lDKXxv3=7T8vebYEf2GnHvqeOh/0TgFFgNzfckxTcBNzZeSGzjlNLlbJ9NDPNSTqSdLNqh5j9wLWy4Dd&Kzux=PnjtLHyHSr |
request | POST http://www.qqcx666888.top/ga6b/ |
request | GET http://www.qqcx666888.top/ga6b/?lDKXxv3=eIOqojsK4xpnapytTTDNeQQlEQNyaN45Mu2frT25CMa88Pt4x/OA2saBEpBSOPq2dGKSSZM3&Kzux=PnjtLHyHSr |
request | POST http://www.belledescontos.com/ga6b/ |
request | GET http://www.belledescontos.com/ga6b/?lDKXxv3=jgYBUTBv6juzDCabe4OWCqutfSnVgXfaFkkijkSn/1f1jJLEA2ITjcU5AEV22xDLWIcCZZOm&Kzux=PnjtLHyHSr |
request | POST http://www.onra.top/ga6b/ |
request | GET http://www.onra.top/ga6b/?lDKXxv3=oElzuWp1f34WuFFQH0ElFrJlzB2XRtqeKiQMWTUoMD39vhgZ+y+e3BJkM1IQMs1XY69eCkQ6&Kzux=PnjtLHyHSr |
request | POST http://www.soulwinningministry.com/ga6b/ |
request | GET http://www.soulwinningministry.com/ga6b/?lDKXxv3=QlWlhrdmA38F39wdH59qDKgCLzke0jtbLkghOfWKUCAF1Rx/+ASUr0tJhxHvOSZs2DWzt0F9&Kzux=PnjtLHyHSr |
request | POST http://www.infinityrope.store/ga6b/ |
request | GET http://www.infinityrope.store/ga6b/?lDKXxv3=L/c9eZQCXLd/YVoAQOP3tZ3B8nNkn+pww7YQb0Xhol9/59b8TqV7CKFWTb/5H/3WmVOflfic&Kzux=PnjtLHyHSr |
request | POST http://www.acacave.com/ga6b/ |
request | GET http://www.acacave.com/ga6b/?lDKXxv3=LZj7dIufhWlgov4/daUw8E4ZVYKGDHaQ4e5klmj4Sj863sAeUYBdGT0Z9uhDs1Zyx3HrxG1c&Kzux=PnjtLHyHSr |
request | POST http://www.egyptian-museum.com/ga6b/ |
request | POST http://www.szkoleniawcag.online/ga6b/ |
request | POST http://www.gritzcharlestonluxuryinn.store/ga6b/ |
request | POST http://www.nobodybutgod.com/ga6b/ |
request | POST http://www.afghantattoos.com/ga6b/ |
request | POST http://www.mystudentregistration.com/ga6b/ |
request | POST http://www.corvusexpeditii.xyz/ga6b/ |
request | POST http://www.qqcx666888.top/ga6b/ |
request | POST http://www.belledescontos.com/ga6b/ |
request | POST http://www.onra.top/ga6b/ |
request | POST http://www.soulwinningministry.com/ga6b/ |
request | POST http://www.infinityrope.store/ga6b/ |
request | POST http://www.acacave.com/ga6b/ |
domain | www.qqcx666888.top | description | Generic top level domain TLD | ||||||
domain | www.onra.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Local\Temp\nst64CE.tmp\ozajwm.dll |
file | C:\Users\test22\AppData\Local\Temp\nst64CE.tmp\ozajwm.dll |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.2 |
FireEye | Generic.mg.d2664cef24240dc8 |
Cylance | Unsafe |
Sangfor | Suspicious.Win32.Save.a |
Arcabit | Zum.Androm.1 |
Cyren | W32/Injector.ANV.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.EQKJ |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.NSISX.Spy.Gen.2 |
Avast | Win32:PWSX-gen [Trj] |
Sophos | Generic ML PUA (PUA) |
DrWeb | Trojan.Packed2.43581 |
McAfee-GW-Edition | BehavesLike.Win32.Vopak.dc |
Emsisoft | Trojan.NSISX.Spy.Gen.2 (B) |
Ikarus | Trojan.NSIS.Agent.S |
Microsoft | Trojan:Win32/Lokibot.SISN!MTB |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Zum.Androm.1 |
Cynet | Malicious (score: 100) |
BitDefenderTheta | Gen:NN.ZedlaF.34236.bu4@amjGbCfi |
MAX | malware (ai score=88) |
SentinelOne | Static AI - Malicious PE |
Fortinet | W32/Injector_AGen.AW!tr |
AVG | Win32:PWSX-gen [Trj] |
Cybereason | malicious.f24240 |
Panda | Trj/CI.A |