Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 12, 2021, 10:22 a.m. | Nov. 12, 2021, 10:24 a.m. |
-
-
randyzx.exe "C:\Users\test22\AppData\Local\Temp\randyzx.exe"
2908
-
IP Address | Status | Action |
---|---|---|
112.213.89.167 | Active | Moloch |
139.162.22.174 | Active | Moloch |
164.124.101.2 | Active | Moloch |
165.3.38.204 | Active | Moloch |
174.136.53.234 | Active | Moloch |
182.50.132.242 | Active | Moloch |
183.110.224.48 | Active | Moloch |
198.143.141.58 | Active | Moloch |
198.54.117.215 | Active | Moloch |
198.54.117.216 | Active | Moloch |
199.59.242.153 | Active | Moloch |
52.20.84.62 | Active | Moloch |
67.20.76.187 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.lapshtop.com/bcwg/?K2JxbH=wUySEiascsr9D8c2BIQ18sSRA5rslpjxBOFBZGfrUsjOddX4oEbTVz81rK/Zkvrysl2nGz8m&DVEh=_6Ll7hO0kB_lC6NP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.warungbangtejo.com/bcwg/?K2JxbH=SgvZNObATFMTlqVuCwYU/mNJmciBV7FQPJy+pG8Ix3bN0Yr9DC0NgmdXt3uIaJgFzQeuYxGC&DVEh=_6Ll7hO0kB_lC6NP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.xn--2e0br59a7ucquav02b.com/bcwg/?K2JxbH=pQQL7b8PQjIakczZVfg4mf3gCPRS6D9ZOKyzG2tlTN3KO1Rxn8+tZtRSzcCnozU4yNknuL2g&DVEh=_6Ll7hO0kB_lC6NP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.teamsportsco.com/bcwg/?K2JxbH=LUVgUL479bIqqk3ORCf1QMU/lNnxalrcAvjpZtsa3xReq2/7WljjEd19Ni9t2KdUDciH5z5N&DVEh=_6Ll7hO0kB_lC6NP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.bestmodsforminecraft.com/bcwg/?K2JxbH=u3D9O57RwCU+dLWrlGpeDGeo2M9sMCfwIOXzMY2sfMqkuovEuCTIG9e2+hzC4vBST8+hHSxP&DVEh=_6Ll7hO0kB_lC6NP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.islands.sbs/bcwg/?K2JxbH=+v6Ju1bbPEr27rAl6h9Vh6DwdAseF61Q8FTmj5Zf1lbcWVY/FoEI26XDdpmzYlxJa/b1zb2x&DVEh=_6Ll7hO0kB_lC6NP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.golfyouth.com/bcwg/?K2JxbH=gzbrkMMotKIa9vgK81aFxhEtS3UImgZxKG0vXI7g/9E5XFoxbTI47wSWmloWf4m2yFzT3vxc&DVEh=_6Ll7hO0kB_lC6NP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.crispzen.com/bcwg/?K2JxbH=+/ZIvyxX6kL8jbADP+b36d4ErYI+YhkPQzrXTA1gLmOg2CKdA32GVpkkuHqugibVYpZRA2Vj&DVEh=_6Ll7hO0kB_lC6NP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.beysconstruction.com/bcwg/?K2JxbH=/N+etiaYgh4y1AIV/pT1PLv0vE6mOqiJtCGwJr/v9fjPIVjAjiHvqmf2IgKMCPUynu/mdIX8&DVEh=_6Ll7hO0kB_lC6NP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.anngonsaigon.net/bcwg/?K2JxbH=wqgILUcZyHa+Z7UtvI0acoklRL2AhWVGWbIreuIdQt/S5jZTqUAJlUqP8Jn8EpWYP6HQfk8g&DVEh=_6Ll7hO0kB_lC6NP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.feistybubblegum.com/bcwg/?K2JxbH=hdQFJ8Ir8v5fkgcFd8CzLLrVz37vJgj+NyOD7+70Q0xeWkZLjYckecGpejCZ4HwphARpxocr&DVEh=_6Ll7hO0kB_lC6NP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.jyyhhx.com/bcwg/?K2JxbH=JdyfCUB7JR9AgohLYV0K4ZmjilZp8V/GSpHmCvhTfp8k2jVCFDVbT9JcHb7zJEZW9ZQYmuhg&9r=2dRd_npH |
request | GET http://www.lapshtop.com/bcwg/?K2JxbH=wUySEiascsr9D8c2BIQ18sSRA5rslpjxBOFBZGfrUsjOddX4oEbTVz81rK/Zkvrysl2nGz8m&DVEh=_6Ll7hO0kB_lC6NP |
request | GET http://www.warungbangtejo.com/bcwg/?K2JxbH=SgvZNObATFMTlqVuCwYU/mNJmciBV7FQPJy+pG8Ix3bN0Yr9DC0NgmdXt3uIaJgFzQeuYxGC&DVEh=_6Ll7hO0kB_lC6NP |
request | GET http://www.xn--2e0br59a7ucquav02b.com/bcwg/?K2JxbH=pQQL7b8PQjIakczZVfg4mf3gCPRS6D9ZOKyzG2tlTN3KO1Rxn8+tZtRSzcCnozU4yNknuL2g&DVEh=_6Ll7hO0kB_lC6NP |
request | GET http://www.teamsportsco.com/bcwg/?K2JxbH=LUVgUL479bIqqk3ORCf1QMU/lNnxalrcAvjpZtsa3xReq2/7WljjEd19Ni9t2KdUDciH5z5N&DVEh=_6Ll7hO0kB_lC6NP |
request | GET http://www.bestmodsforminecraft.com/bcwg/?K2JxbH=u3D9O57RwCU+dLWrlGpeDGeo2M9sMCfwIOXzMY2sfMqkuovEuCTIG9e2+hzC4vBST8+hHSxP&DVEh=_6Ll7hO0kB_lC6NP |
request | GET http://www.islands.sbs/bcwg/?K2JxbH=+v6Ju1bbPEr27rAl6h9Vh6DwdAseF61Q8FTmj5Zf1lbcWVY/FoEI26XDdpmzYlxJa/b1zb2x&DVEh=_6Ll7hO0kB_lC6NP |
request | GET http://www.golfyouth.com/bcwg/?K2JxbH=gzbrkMMotKIa9vgK81aFxhEtS3UImgZxKG0vXI7g/9E5XFoxbTI47wSWmloWf4m2yFzT3vxc&DVEh=_6Ll7hO0kB_lC6NP |
request | GET http://www.crispzen.com/bcwg/?K2JxbH=+/ZIvyxX6kL8jbADP+b36d4ErYI+YhkPQzrXTA1gLmOg2CKdA32GVpkkuHqugibVYpZRA2Vj&DVEh=_6Ll7hO0kB_lC6NP |
request | GET http://www.beysconstruction.com/bcwg/?K2JxbH=/N+etiaYgh4y1AIV/pT1PLv0vE6mOqiJtCGwJr/v9fjPIVjAjiHvqmf2IgKMCPUynu/mdIX8&DVEh=_6Ll7hO0kB_lC6NP |
request | GET http://www.anngonsaigon.net/bcwg/?K2JxbH=wqgILUcZyHa+Z7UtvI0acoklRL2AhWVGWbIreuIdQt/S5jZTqUAJlUqP8Jn8EpWYP6HQfk8g&DVEh=_6Ll7hO0kB_lC6NP |
request | GET http://www.feistybubblegum.com/bcwg/?K2JxbH=hdQFJ8Ir8v5fkgcFd8CzLLrVz37vJgj+NyOD7+70Q0xeWkZLjYckecGpejCZ4HwphARpxocr&DVEh=_6Ll7hO0kB_lC6NP |
request | GET http://www.jyyhhx.com/bcwg/?K2JxbH=JdyfCUB7JR9AgohLYV0K4ZmjilZp8V/GSpHmCvhTfp8k2jVCFDVbT9JcHb7zJEZW9ZQYmuhg&9r=2dRd_npH |
file | C:\Users\test22\AppData\Local\Temp\nsiE2DF.tmp\momu.dll |
file | C:\Users\test22\AppData\Local\Temp\nsiE2DF.tmp\momu.dll |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.37985418 |
FireEye | Generic.mg.c197f0089f58e99b |
McAfee | RDN/Generic.tfr |
K7AntiVirus | Riskware ( 00584baa1 ) |
Alibaba | TrojanSpy:Win32/Lokibot.7f4b0144 |
K7GW | Riskware ( 00584baa1 ) |
Cybereason | malicious.89f58e |
Arcabit | Trojan.Generic.D2439C8A |
Cyren | W32/Injector.APC.gen!Eldorado |
Symantec | Packed.Generic.606 |
ESET-NOD32 | a variant of Win32/Injector.EQNE |
TrendMicro-HouseCall | TROJ_GEN.R002H01K921 |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-Spy.Win32.Noon.gen |
BitDefender | Trojan.GenericKD.37985418 |
Avast | Win32:PWSX-gen [Trj] |
Tencent | Win32.Trojan.Androm.Sxed |
Ad-Aware | Trojan.GenericKD.37985418 |
Sophos | Mal/Generic-S |
F-Secure | Trojan.TR/Injector.ibvnt |
McAfee-GW-Edition | BehavesLike.Win32.Generic.hh |
Emsisoft | Trojan.GenericKD.37985418 (B) |
Ikarus | Trojan.Win32.Injector |
Jiangmin | NetTool.FRP.ak |
Avira | TR/Injector.ibvnt |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Gridinsoft | Trojan.Win32.Downloader.sa |
Microsoft | Trojan:Win32/Lokibot.SISN!MTB |
GData | Win32.Trojan-Stealer.FormBook.EHM1DI |
Cynet | Malicious (score: 100) |
ALYac | Trojan.GenericKD.37985418 |
MAX | malware (ai score=86) |
VBA32 | TrojanSpy.Noon |
Malwarebytes | Trojan.Injector |
APEX | Malicious |
Fortinet | W32/Injector.EQMU!tr |
AVG | Win32:PWSX-gen [Trj] |