Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 3, 2021, 9:35 a.m. | Nov. 3, 2021, 10 a.m. |
IP Address | Status | Action |
---|---|---|
104.21.11.164 | Active | Moloch |
138.201.145.141 | Active | Moloch |
154.23.109.135 | Active | Moloch |
154.31.59.73 | Active | Moloch |
157.90.247.57 | Active | Moloch |
164.124.101.2 | Active | Moloch |
185.151.30.171 | Active | Moloch |
198.54.117.210 | Active | Moloch |
208.91.197.27 | Active | Moloch |
216.194.173.79 | Active | Moloch |
34.102.136.180 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.rukygua.xyz/kqna/?FF=vdzyafBylavAbS+d3A7xFaH4XlS6aGXKpuM7CPthmaBAHS5g9tZURwvUOmhgWt080aEhAXR6&llsp=fTRHzt4hznoXCf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.achyutlifesciences.com/kqna/?FF=asWl3V4IF2Q2DWn67+zvcIQTEiu5x496a9UiR3whzNCG2SwZhTxwEV7pZSN2Dnrub4ZDXyCK&llsp=fTRHzt4hznoXCf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fraserstephendop.com/kqna/?FF=/ubmoBp65Okyuu3LQpd6BICjkbw0SXb2/UwCCZwJ/Fe1H/pHrLEpRm6qotblqBtYRSTWmjxF&llsp=fTRHzt4hznoXCf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.alifdanismanlik.com/kqna/?FF=mQnobkOfgPtywstNWl93w92LClziyi9exAIAZ2dbJOdepP7Ogt31xGCBzTFokFA1igwL7X4B&llsp=fTRHzt4hznoXCf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.candypalette.com/kqna/?FF=gfz7SykQtqnvqGHDVt9Sq/sQwFu3mmkE3P7hoh5mXhnlze04JbT/9GbgDzlkmDUFL9Oz3qhg&llsp=fTRHzt4hznoXCf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.netkopat.com/kqna/?FF=XCeMQl5kuZk/VAPz1x3NMFNaYm0TP5U/J5/9BEX1GnrVHj0GaV8zX9dSOYzSTsdbHQNQtFsF&llsp=fTRHzt4hznoXCf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.surfsolutions.info/kqna/?FF=dcnZeOVVJSfvUaco8qQNZ9XrhbJ3we+xyEUMa9yoWpEuWq2eXXPIXA5TkXgJFjsZU/Pq8NER&llsp=fTRHzt4hznoXCf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.worldwidecorumuk.com/kqna/?FF=OBIcuqqGork2NsAIYqmQWIB+gSUu4IfRNNykabPIUkFakVgutSjYpuz1sjZ4AXSicZLr38Yo&llsp=fTRHzt4hznoXCf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.thevishantiverse.art/kqna/?FF=/f/IcA6eDDPBLaOZcHBfDlfAbij2pImhanWAYHxYX02BEqYlDUoXYvshQCmTuxpCPFsxIcfP&llsp=fTRHzt4hznoXCf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.jcswkj.net/kqna/?FF=aK4LS/24crfyJFniV0tBnDYjbs/R2Z9mGbesLv5x/rI0+ZowC+SQ6lOEpvnTq1Fm4VU9hd0Z&llsp=fTRHzt4hznoXCf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.midatlanticbath.com/kqna/?FF=ggB/CL/KYRtKG6XlF3MzMphhLgqrG506l6vnNW5K6bJVc8waEANRFYYD3RhOV4cBkcToPXaa&AlO=O2MtmfRpT | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.candypalette.com/kqna/?FF=gfz7SykQtqnvqGHDVt9Sq/sQwFu3mmkE3P7hoh5mXhnlze04JbT/9GbgDzlkmDUFL9Oz3qhg&AlO=O2MtmfRpT |
request | GET http://www.rukygua.xyz/kqna/?FF=vdzyafBylavAbS+d3A7xFaH4XlS6aGXKpuM7CPthmaBAHS5g9tZURwvUOmhgWt080aEhAXR6&llsp=fTRHzt4hznoXCf |
request | GET http://www.achyutlifesciences.com/kqna/?FF=asWl3V4IF2Q2DWn67+zvcIQTEiu5x496a9UiR3whzNCG2SwZhTxwEV7pZSN2Dnrub4ZDXyCK&llsp=fTRHzt4hznoXCf |
request | GET http://www.fraserstephendop.com/kqna/?FF=/ubmoBp65Okyuu3LQpd6BICjkbw0SXb2/UwCCZwJ/Fe1H/pHrLEpRm6qotblqBtYRSTWmjxF&llsp=fTRHzt4hznoXCf |
request | GET http://www.alifdanismanlik.com/kqna/?FF=mQnobkOfgPtywstNWl93w92LClziyi9exAIAZ2dbJOdepP7Ogt31xGCBzTFokFA1igwL7X4B&llsp=fTRHzt4hznoXCf |
request | GET http://www.candypalette.com/kqna/?FF=gfz7SykQtqnvqGHDVt9Sq/sQwFu3mmkE3P7hoh5mXhnlze04JbT/9GbgDzlkmDUFL9Oz3qhg&llsp=fTRHzt4hznoXCf |
request | GET http://www.netkopat.com/kqna/?FF=XCeMQl5kuZk/VAPz1x3NMFNaYm0TP5U/J5/9BEX1GnrVHj0GaV8zX9dSOYzSTsdbHQNQtFsF&llsp=fTRHzt4hznoXCf |
request | GET http://www.surfsolutions.info/kqna/?FF=dcnZeOVVJSfvUaco8qQNZ9XrhbJ3we+xyEUMa9yoWpEuWq2eXXPIXA5TkXgJFjsZU/Pq8NER&llsp=fTRHzt4hznoXCf |
request | GET http://www.worldwidecorumuk.com/kqna/?FF=OBIcuqqGork2NsAIYqmQWIB+gSUu4IfRNNykabPIUkFakVgutSjYpuz1sjZ4AXSicZLr38Yo&llsp=fTRHzt4hznoXCf |
request | GET http://www.thevishantiverse.art/kqna/?FF=/f/IcA6eDDPBLaOZcHBfDlfAbij2pImhanWAYHxYX02BEqYlDUoXYvshQCmTuxpCPFsxIcfP&llsp=fTRHzt4hznoXCf |
request | GET http://www.jcswkj.net/kqna/?FF=aK4LS/24crfyJFniV0tBnDYjbs/R2Z9mGbesLv5x/rI0+ZowC+SQ6lOEpvnTq1Fm4VU9hd0Z&llsp=fTRHzt4hznoXCf |
request | GET http://www.midatlanticbath.com/kqna/?FF=ggB/CL/KYRtKG6XlF3MzMphhLgqrG506l6vnNW5K6bJVc8waEANRFYYD3RhOV4cBkcToPXaa&AlO=O2MtmfRpT |
request | GET http://www.candypalette.com/kqna/?FF=gfz7SykQtqnvqGHDVt9Sq/sQwFu3mmkE3P7hoh5mXhnlze04JbT/9GbgDzlkmDUFL9Oz3qhg&AlO=O2MtmfRpT |
file | C:\Users\test22\AppData\Local\Temp\nszDF64.tmp\vtlgn.dll |
file | C:\Users\test22\AppData\Local\Temp\nszDF64.tmp\vtlgn.dll |
Lionic | Trojan.Win32.Noon.l!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Dropped:Trojan.GenericKDZ.79521 |
FireEye | Generic.mg.c6def7e067895d7c |
Cylance | Unsafe |
BitDefender | Dropped:Trojan.GenericKDZ.79521 |
Cybereason | malicious.067895 |
Cyren | W32/Injector.AMK.gen!Eldorado |
Symantec | Packed.Generic.606 |
ESET-NOD32 | a variant of Win32/Injector.EQKW |
Paloalto | generic.ml |
Kaspersky | UDS:Trojan-Spy.Win32.Noon.gen |
Ad-Aware | Dropped:Trojan.GenericKDZ.79521 |
Sophos | Generic ML PUA (PUA) |
McAfee-GW-Edition | BehavesLike.Win32.Puper.dc |
Emsisoft | Dropped:Trojan.GenericKDZ.79521 (B) |
SentinelOne | Static AI - Malicious PE |
Microsoft | Trojan:Script/Phonzy.C!ml |
GData | Dropped:Trojan.GenericKDZ.79521 |
Cynet | Malicious (score: 100) |
MAX | malware (ai score=87) |
Malwarebytes | Trojan.Injector |
APEX | Malicious |
Ikarus | Trojan.NSIS.Agent.S |
Fortinet | W32/Injector.EOLV!tr |
AVG | Win32:InjectorX-gen [Trj] |
Avast | Win32:InjectorX-gen [Trj] |