Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 3, 2021, 9:35 a.m. | Nov. 3, 2021, 9:58 a.m. |
IP Address | Status | Action |
---|---|---|
104.21.67.135 | Active | Moloch |
156.240.151.177 | Active | Moloch |
162.243.47.214 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.67.188.178 | Active | Moloch |
198.54.117.212 | Active | Moloch |
217.116.0.191 | Active | Moloch |
217.160.0.228 | Active | Moloch |
3.223.115.185 | Active | Moloch |
34.102.136.180 | Active | Moloch |
52.20.218.92 | Active | Moloch |
66.29.132.90 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.passionfruitny.com/ddzw/?mfsl7bH=j1WVYPKREe/iqZY/kWyb0aUoudGjuNgxSNOIs5VZ0Ce82FDJGRww/lsNfpSf2w0iyg22p7x+&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.mammutphilippines.com/ddzw/?mfsl7bH=XKHX2v+fkBCunocGj3rFn4v4QvpoQkFCXwZofEueDHFtym0hNlNi4X+F8lnrY2pUFmsye07q&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.juliamoranmartin.com/ddzw/?mfsl7bH=6Q7JXEhGn1nCiVzGW7OvR+w3qfbQF/Gh1STMm4wNuOhMgkpI2l4cOFz8lzrYHCV9ary/dAD1&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.indousmedicalscribing.com/ddzw/?mfsl7bH=DRjOZjpI2ePD8liCP7nAEqld0QN3J7LPZkiMBFhhGIOFOLdgOHazcMvaZ45mzBGaWvYQOKFm&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.maininger.com/ddzw/?mfsl7bH=Al5s2weciqIrbGrSdgJl09FIEtaDwUgBVTp5oJs4d9EpwXdgHokngPi2WL0RGoaVCF/E0Wih&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.sportherd.com/ddzw/?mfsl7bH=rCtcxUrpi6xWOPxHR9QIazD6WLKYE8OL7gbDSdg1OmZV9tjji7TnyuMb4MUm6X4O20yFr/T8&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.1207rossmoyne.com/ddzw/?mfsl7bH=LcdAyp9UhGnU0/En4/Gnshl/55/Xj+RSazUCag0Yulb+Lb/aCp0DqP3VqPYelJD3cCZaOJsZ&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.shleppersmovingandstorage.com/ddzw/?mfsl7bH=nJVBLhUe1R7OLjQKnJ1+9B0dwuPw50mbu7VKOx7cWYJWAd8dKn2Ien29zK/OibqoKzMqUCH+&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.schittstore.com/ddzw/?mfsl7bH=eu2i37xHcB7A6W2IRVlK/UzsyDYSkffg03LYHul4MxZENkm7/tK6JqlOvVlzNPIE1eHf1Zcs&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.palisadesstore.com/ddzw/?mfsl7bH=LwQSSZmFKq116JGVF/0nPPcUBWVsd/SLW5N2AEu8xRB8FPO8JQ7fj8OceGppuzoGtS6UuAu9&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.flashpointyouth.com/ddzw/?mfsl7bH=DtGmsEY2iNUZLLEVBi/ZCM9x7s+fqvGmeUpJsqhGzb7D/5NM434HcKBEzKv2yzGV8HcXfEpn&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.wardrobewish.com/ddzw/?mfsl7bH=uA4UJt9CuJW2Fk/qMtECVhB4zRiz0JBHg2PhgT5FixFIsseZNzpFmLBp65IAN54qNvC2Kf2d&lZQ=7neHz4LxM | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.mikespotts.com/ddzw/?mfsl7bH=mk8GRRlrsEWHLX4GtkVXwGml9VwBCAg5qtWMStieodEVO8IiiibI6Nu+OP8utk0O5PU1HT+e&lZQ=7neHz4LxM |
request | GET http://www.passionfruitny.com/ddzw/?mfsl7bH=j1WVYPKREe/iqZY/kWyb0aUoudGjuNgxSNOIs5VZ0Ce82FDJGRww/lsNfpSf2w0iyg22p7x+&lZQ=7neHz4LxM |
request | GET http://www.mammutphilippines.com/ddzw/?mfsl7bH=XKHX2v+fkBCunocGj3rFn4v4QvpoQkFCXwZofEueDHFtym0hNlNi4X+F8lnrY2pUFmsye07q&lZQ=7neHz4LxM |
request | GET http://www.juliamoranmartin.com/ddzw/?mfsl7bH=6Q7JXEhGn1nCiVzGW7OvR+w3qfbQF/Gh1STMm4wNuOhMgkpI2l4cOFz8lzrYHCV9ary/dAD1&lZQ=7neHz4LxM |
request | GET http://www.indousmedicalscribing.com/ddzw/?mfsl7bH=DRjOZjpI2ePD8liCP7nAEqld0QN3J7LPZkiMBFhhGIOFOLdgOHazcMvaZ45mzBGaWvYQOKFm&lZQ=7neHz4LxM |
request | GET http://www.maininger.com/ddzw/?mfsl7bH=Al5s2weciqIrbGrSdgJl09FIEtaDwUgBVTp5oJs4d9EpwXdgHokngPi2WL0RGoaVCF/E0Wih&lZQ=7neHz4LxM |
request | GET http://www.sportherd.com/ddzw/?mfsl7bH=rCtcxUrpi6xWOPxHR9QIazD6WLKYE8OL7gbDSdg1OmZV9tjji7TnyuMb4MUm6X4O20yFr/T8&lZQ=7neHz4LxM |
request | GET http://www.1207rossmoyne.com/ddzw/?mfsl7bH=LcdAyp9UhGnU0/En4/Gnshl/55/Xj+RSazUCag0Yulb+Lb/aCp0DqP3VqPYelJD3cCZaOJsZ&lZQ=7neHz4LxM |
request | GET http://www.shleppersmovingandstorage.com/ddzw/?mfsl7bH=nJVBLhUe1R7OLjQKnJ1+9B0dwuPw50mbu7VKOx7cWYJWAd8dKn2Ien29zK/OibqoKzMqUCH+&lZQ=7neHz4LxM |
request | GET http://www.schittstore.com/ddzw/?mfsl7bH=eu2i37xHcB7A6W2IRVlK/UzsyDYSkffg03LYHul4MxZENkm7/tK6JqlOvVlzNPIE1eHf1Zcs&lZQ=7neHz4LxM |
request | GET http://www.palisadesstore.com/ddzw/?mfsl7bH=LwQSSZmFKq116JGVF/0nPPcUBWVsd/SLW5N2AEu8xRB8FPO8JQ7fj8OceGppuzoGtS6UuAu9&lZQ=7neHz4LxM |
request | GET http://www.flashpointyouth.com/ddzw/?mfsl7bH=DtGmsEY2iNUZLLEVBi/ZCM9x7s+fqvGmeUpJsqhGzb7D/5NM434HcKBEzKv2yzGV8HcXfEpn&lZQ=7neHz4LxM |
request | GET http://www.wardrobewish.com/ddzw/?mfsl7bH=uA4UJt9CuJW2Fk/qMtECVhB4zRiz0JBHg2PhgT5FixFIsseZNzpFmLBp65IAN54qNvC2Kf2d&lZQ=7neHz4LxM |
request | GET http://www.mikespotts.com/ddzw/?mfsl7bH=mk8GRRlrsEWHLX4GtkVXwGml9VwBCAg5qtWMStieodEVO8IiiibI6Nu+OP8utk0O5PU1HT+e&lZQ=7neHz4LxM |
file | C:\Users\test22\AppData\Local\Temp\nsnE148.tmp\xggenq.dll |
file | C:\Users\test22\AppData\Local\Temp\nsnE148.tmp\xggenq.dll |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Dropped:Trojan.GenericKDZ.79521 |
FireEye | Generic.mg.11cbfa99fb5ebe8c |
Cylance | Unsafe |
Cybereason | malicious.9fb5eb |
Arcabit | Trojan.Nemesis.D6F1 |
Cyren | W32/Injector.AMK.gen!Eldorado |
Symantec | Packed.Generic.606 |
ESET-NOD32 | a variant of Win32/Injector.EQKW |
APEX | Malicious |
Paloalto | generic.ml |
BitDefender | Dropped:Trojan.GenericKDZ.79521 |
Avast | Win32:PWSX-gen [Trj] |
Ad-Aware | Dropped:Trojan.GenericKDZ.79521 |
Emsisoft | Dropped:Trojan.GenericKDZ.79521 (B) |
McAfee-GW-Edition | BehavesLike.Win32.Puper.dc |
Sophos | Generic ML PUA (PUA) |
Ikarus | Trojan.NSIS.Agent |
Microsoft | Trojan:Win32/Tnega!ml |
GData | Dropped:Trojan.GenericKDZ.79521 |
Cynet | Malicious (score: 100) |
MAX | malware (ai score=88) |
Malwarebytes | Trojan.Injector |
SentinelOne | Static AI - Malicious PE |
Fortinet | W32/Injector.EOLV!tr |
AVG | Win32:PWSX-gen [Trj] |