Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 5, 2021, 9:09 a.m. | Nov. 5, 2021, 9:40 a.m. |
IP Address | Status | Action |
---|---|---|
104.21.79.9 | Active | Moloch |
172.67.196.11 | Active | Moloch |
172.67.207.136 | Active | Moloch |
103.148.14.203 | Active | Moloch |
104.21.8.56 | Active | Moloch |
154.23.202.51 | Active | Moloch |
156.240.151.190 | Active | Moloch |
162.241.218.178 | Active | Moloch |
162.241.253.114 | Active | Moloch |
164.124.101.2 | Active | Moloch |
166.88.19.180 | Active | Moloch |
172.67.202.198 | Active | Moloch |
199.34.228.77 | Active | Moloch |
23.227.38.74 | Active | Moloch |
23.27.138.15 | Active | Moloch |
34.102.136.180 | Active | Moloch |
67.211.65.43 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.antelbd.com/p0se/?Upth=9erJsbmg89xRlz0M2UbGQGsoL3knU+btxwpJSlEvKwY//6Ro8ymG4cTM8A9G1IzAegjGNHN5&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.rapidfreecredit.com/p0se/?Upth=EgoGtPvOzMQIHn+MI9K9SlgAXJGJBFkzaqro+xII3Owtt3Khuq48OlyGMf8ozr+N8CoP+XHl&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.drproteaches.com/p0se/?Upth=woR5xm3tnDpzscA506QhcYxpqJNYYUoqwaxL1TBnwACXL4ehmoVy8YHXz+Srph4gv85KcD2/&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.puss888.com/p0se/?Upth=kikFeNiO3Wy3pwtISJcM7/vkxkaOrG97TwCy9kP35exs7OvQFm8ZXay1fTQTva1c0oVEPLTK&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.bailios.com/p0se/?Upth=8oLSLrJeYc+K0ytzOJikqVU0igr6L5hpGSYkGAIomLt8RmfP6w1jUuRWukm53rjVgQXpPW5Y&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ss5312.com/p0se/?Upth=VXm5Q0G4kF4WmG3lTMiXsUIcZR7Z75QHUAb2U0i9WhY0TVcNQnEKdNZZrn4ryxNGGf72+MNM&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.islandrentals.biz/p0se/?Upth=swsh7jkH3Jayx1oBVzw679OGrX1puxEck2MRsug9EfA8sAUa4DViYtQbxqQy6tgBaEK34XmX&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.oprimanumerodos.com/p0se/?Upth=xlYZ5X0oz3/WSnhnuO8VLYURni7dK5M/z3/1M5B1eWdqmk4yw0hlgYU/AWpZpglM84vVPpwr&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.officesetupofficesetup.com/p0se/?Upth=EYinZUgnnSwJyPV9oEessIoGQkE3PhJa69jO6sH1XRv94op+1srhHlr5FDeZOdoaC0vdviNL&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.attractivereviews.com/p0se/?Upth=ovk/jIrnGvNklwPKoDa/FgXcfy4LLp6cpdBpVVYi4PmHjc59s+hx7TQFj4PK4LVd8vVfURbY&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.bestexpecting.com/p0se/?Upth=aASfAAL76qMqqLN3P5FTu5qU9JswWMTr4/m2v90Be8FVcTL4yVaKxlDSmQkhSQbnDGJjdHVZ&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.discsoverylandco.com/p0se/?Upth=BteP4tPaBKGelLixwpfDlG/9A6mmS+0MA34DaBA3zGLeePe9IT5he11Epx4cASOQEPkGi3lZ&S2Jl9T=JR-Ptri8rrtH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.zzsline.com/p0se/?Upth=kthmE/oWyD4fjO8tHH8xHUIk2isBffkb9Kt5y5yO+PwFSvLgMBfFKRyBis2HAYR5aHyddc0l&p0D=AfhHLL9 |
request | GET http://www.antelbd.com/p0se/?Upth=9erJsbmg89xRlz0M2UbGQGsoL3knU+btxwpJSlEvKwY//6Ro8ymG4cTM8A9G1IzAegjGNHN5&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.rapidfreecredit.com/p0se/?Upth=EgoGtPvOzMQIHn+MI9K9SlgAXJGJBFkzaqro+xII3Owtt3Khuq48OlyGMf8ozr+N8CoP+XHl&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.drproteaches.com/p0se/?Upth=woR5xm3tnDpzscA506QhcYxpqJNYYUoqwaxL1TBnwACXL4ehmoVy8YHXz+Srph4gv85KcD2/&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.puss888.com/p0se/?Upth=kikFeNiO3Wy3pwtISJcM7/vkxkaOrG97TwCy9kP35exs7OvQFm8ZXay1fTQTva1c0oVEPLTK&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.bailios.com/p0se/?Upth=8oLSLrJeYc+K0ytzOJikqVU0igr6L5hpGSYkGAIomLt8RmfP6w1jUuRWukm53rjVgQXpPW5Y&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.ss5312.com/p0se/?Upth=VXm5Q0G4kF4WmG3lTMiXsUIcZR7Z75QHUAb2U0i9WhY0TVcNQnEKdNZZrn4ryxNGGf72+MNM&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.islandrentals.biz/p0se/?Upth=swsh7jkH3Jayx1oBVzw679OGrX1puxEck2MRsug9EfA8sAUa4DViYtQbxqQy6tgBaEK34XmX&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.oprimanumerodos.com/p0se/?Upth=xlYZ5X0oz3/WSnhnuO8VLYURni7dK5M/z3/1M5B1eWdqmk4yw0hlgYU/AWpZpglM84vVPpwr&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.officesetupofficesetup.com/p0se/?Upth=EYinZUgnnSwJyPV9oEessIoGQkE3PhJa69jO6sH1XRv94op+1srhHlr5FDeZOdoaC0vdviNL&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.attractivereviews.com/p0se/?Upth=ovk/jIrnGvNklwPKoDa/FgXcfy4LLp6cpdBpVVYi4PmHjc59s+hx7TQFj4PK4LVd8vVfURbY&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.bestexpecting.com/p0se/?Upth=aASfAAL76qMqqLN3P5FTu5qU9JswWMTr4/m2v90Be8FVcTL4yVaKxlDSmQkhSQbnDGJjdHVZ&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.discsoverylandco.com/p0se/?Upth=BteP4tPaBKGelLixwpfDlG/9A6mmS+0MA34DaBA3zGLeePe9IT5he11Epx4cASOQEPkGi3lZ&S2Jl9T=JR-Ptri8rrtH |
request | GET http://www.zzsline.com/p0se/?Upth=kthmE/oWyD4fjO8tHH8xHUIk2isBffkb9Kt5y5yO+PwFSvLgMBfFKRyBis2HAYR5aHyddc0l&p0D=AfhHLL9 |
file | C:\Users\test22\AppData\Local\Temp\nszDF74.tmp\airxybggzuu.dll |
file | C:\Users\test22\AppData\Local\Temp\nszDF74.tmp\airxybggzuu.dll |
host | 104.21.79.9 | |||
host | 172.67.196.11 | |||
host | 172.67.207.136 |
Bkav | W32.AIDetect.malware2 |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Fragtor.37895 |
FireEye | Generic.mg.d06c38d984a2f6e2 |
Cybereason | malicious.984a2f |
BitDefenderTheta | Gen:NN.ZedlaF.34266.fq4@aKffsYoi |
Cyren | W32/Injector.AOR.gen!Eldorado |
ESET-NOD32 | a variant of Win32/Injector.EQLU |
APEX | Malicious |
Kaspersky | HEUR:Trojan.Win32.Zapchast.gen |
BitDefender | Gen:Variant.Fragtor.37895 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.gc |
Emsisoft | Gen:Variant.Fragtor.37895 (B) |
Ikarus | Trojan.NSIS.Agent |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
GData | Zum.Androm.1 |
Cynet | Malicious (score: 100) |
MAX | malware (ai score=89) |
SentinelOne | Static AI - Suspicious PE |
Fortinet | W32/Injector.EQKA!tr |
dead_host | 172.67.207.136:443 |
dead_host | 104.21.79.9:443 |