Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 13, 2021, 1 p.m. | Nov. 13, 2021, 1:22 p.m. |
-
-
loader1.exe "C:\Users\test22\AppData\Local\Temp\loader1.exe"
2888
-
IP Address | Status | Action |
---|---|---|
103.56.98.73 | Active | Moloch |
104.18.27.58 | Active | Moloch |
104.21.75.49 | Active | Moloch |
143.95.1.174 | Active | Moloch |
164.124.101.2 | Active | Moloch |
165.32.109.217 | Active | Moloch |
185.210.145.38 | Active | Moloch |
188.166.46.127 | Active | Moloch |
209.99.40.222 | Active | Moloch |
34.251.91.168 | Active | Moloch |
34.98.99.30 | Active | Moloch |
35.213.169.61 | Active | Moloch |
52.37.245.235 | Active | Moloch |
88.214.207.96 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.garageair.agency/ga6b/?DVEl=d08S4xcN/NMsorWpXwRlyCCH66HZh3etKhFBY5TZ8MkBXXhOwsqcJfUvANfm4lRK3xvcJJRx&1bO8Ax=pFNTGZ90snzLa4C0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.5559913.win/ga6b/?DVEl=BsLI4B+bmIypp6VG9i1mvBr3FbP6MnOeaOpeEVRsQMY9+2loXlkdnmFwfncWgaUkhHBh2x3h&1bO8Ax=pFNTGZ90snzLa4C0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.necesryaou.com/ga6b/?DVEl=Z3o6N93v6CU4m7XtA/lbT1e4xE/jsIueflbFRezDyVtxMYEukOv94ScBegi/ZpW+oVO0nzHV&1bO8Ax=pFNTGZ90snzLa4C0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.egyptian-museum.com/ga6b/?DVEl=CYKd0A9ffzzmh+HMixfnmJt+Ibe3PgwQT1IowcrJSMkSzDwRXwABXy8G05QumwrEDOfj2gVO&1bO8Ax=pFNTGZ90snzLa4C0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.onlinewritingjobs.net/ga6b/?DVEl=PI3t5I/vLPjLEXSAiMassyghn8jG+EohIXjBFkJ1Bgr3IKLvgafQ0xYRNHrG7F5KwDP0G4jF&1bO8Ax=pFNTGZ90snzLa4C0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.tangerineinit.com/ga6b/?DVEl=CgQkCL4kNOXVaMWaW+W+7tG2VuScNWe1RIrYKb/ikW2Nwi/NJBz1hnm9GQ2J2lMDdzGUFZgw&1bO8Ax=pFNTGZ90snzLa4C0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.digitaldreamcloud.net/ga6b/?DVEl=5WGPHl4VPD01j8M9M+tOINDYD63xyRqqO/w0s3LW3P/Qu5xC80vS+vfuMtj60mCVXiqL9STg&1bO8Ax=pFNTGZ90snzLa4C0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.baohiemtv24h.com/ga6b/?DVEl=6dQVu8UHcZgaj0y03GzvAhfNwH0MHXa5ZY8rhbUdbCaY8PlbGz89x08imuD5bjryCUUXVHy+&1bO8Ax=pFNTGZ90snzLa4C0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ara7z.com/ga6b/?DVEl=f8p3ixvuysstkVkbxkSLsyQ08m5iiUSHUSQ+dEucd72/naUGjvA4vd8t8r7qlazlF5SpiXNT&1bO8Ax=pFNTGZ90snzLa4C0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.nobodybutgod.com/ga6b/?DVEl=BS+Mkr60hnaz2VUqn6F4jElENEwbATWztr1txOlCDy4YTJ8rldrX7GuvTHEqc04l9LT0WVoV&1bO8Ax=pFNTGZ90snzLa4C0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.corvusexpeditii.xyz/ga6b/?DVEl=7T8vebYEf2GnHvqeOh/0TgFFgNzfckxTcBNzZeSGzjlNLlbJ9NDPNSTqSdLNqh5j9wLWy4Dd&1bO8Ax=pFNTGZ90snzLa4C0 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.smartgadgetscompare.com/ga6b/?DVEl=vDaGXYd6gjLCQTqwOPGPy5LvomfttahAahHE85Q1VhlijdJF30llx7sZQyFNH9wmHXEWSldG&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.garageair.agency/ga6b/?DVEl=d08S4xcN/NMsorWpXwRlyCCH66HZh3etKhFBY5TZ8MkBXXhOwsqcJfUvANfm4lRK3xvcJJRx&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.5559913.win/ga6b/?DVEl=BsLI4B+bmIypp6VG9i1mvBr3FbP6MnOeaOpeEVRsQMY9+2loXlkdnmFwfncWgaUkhHBh2x3h&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.necesryaou.com/ga6b/?DVEl=Z3o6N93v6CU4m7XtA/lbT1e4xE/jsIueflbFRezDyVtxMYEukOv94ScBegi/ZpW+oVO0nzHV&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.egyptian-museum.com/ga6b/?DVEl=CYKd0A9ffzzmh+HMixfnmJt+Ibe3PgwQT1IowcrJSMkSzDwRXwABXy8G05QumwrEDOfj2gVO&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.onlinewritingjobs.net/ga6b/?DVEl=PI3t5I/vLPjLEXSAiMassyghn8jG+EohIXjBFkJ1Bgr3IKLvgafQ0xYRNHrG7F5KwDP0G4jF&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.tangerineinit.com/ga6b/?DVEl=CgQkCL4kNOXVaMWaW+W+7tG2VuScNWe1RIrYKb/ikW2Nwi/NJBz1hnm9GQ2J2lMDdzGUFZgw&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.digitaldreamcloud.net/ga6b/?DVEl=5WGPHl4VPD01j8M9M+tOINDYD63xyRqqO/w0s3LW3P/Qu5xC80vS+vfuMtj60mCVXiqL9STg&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.baohiemtv24h.com/ga6b/?DVEl=6dQVu8UHcZgaj0y03GzvAhfNwH0MHXa5ZY8rhbUdbCaY8PlbGz89x08imuD5bjryCUUXVHy+&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.ara7z.com/ga6b/?DVEl=f8p3ixvuysstkVkbxkSLsyQ08m5iiUSHUSQ+dEucd72/naUGjvA4vd8t8r7qlazlF5SpiXNT&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.nobodybutgod.com/ga6b/?DVEl=BS+Mkr60hnaz2VUqn6F4jElENEwbATWztr1txOlCDy4YTJ8rldrX7GuvTHEqc04l9LT0WVoV&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.corvusexpeditii.xyz/ga6b/?DVEl=7T8vebYEf2GnHvqeOh/0TgFFgNzfckxTcBNzZeSGzjlNLlbJ9NDPNSTqSdLNqh5j9wLWy4Dd&1bO8Ax=pFNTGZ90snzLa4C0 |
request | GET http://www.smartgadgetscompare.com/ga6b/?DVEl=vDaGXYd6gjLCQTqwOPGPy5LvomfttahAahHE85Q1VhlijdJF30llx7sZQyFNH9wmHXEWSldG&1bO8Ax=pFNTGZ90snzLa4C0 |
file | C:\Users\test22\AppData\Local\Temp\nsfDF54.tmp\xnuko.dll |
file | C:\Users\test22\AppData\Local\Temp\nsfDF54.tmp\xnuko.dll |
dead_host | 165.32.109.217:80 |
MicroWorld-eScan | Trojan.GenericKD.38008516 |
FireEye | Trojan.GenericKD.38008516 |
McAfee | Artemis!18208AA1787D |
Cylance | Unsafe |
Alibaba | Backdoor:Win32/Remcos.8fffc4c2 |
K7GW | Trojan ( 0058a4701 ) |
Cybereason | malicious.1787da |
Cyren | W32/Injector.APR.gen!Eldorado |
Symantec | Packed.Generic.606 |
ESET-NOD32 | a variant of Win32/Injector.EQNK |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Backdoor.Win32.Remcos.gen |
BitDefender | Trojan.GenericKD.38008516 |
Avast | Win32:InjectorX-gen [Trj] |
Tencent | Win32.Backdoor.Remcos.Dwtc |
Ad-Aware | Trojan.GenericKD.38008516 |
Sophos | Mal/Generic-S |
Comodo | fls.noname@0 |
DrWeb | Trojan.Siggen15.40274 |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.dc |
Emsisoft | Trojan.NSISX.Spy.Gen.2 (B) |
SentinelOne | Static AI - Suspicious PE |
GData | Win32.Trojan.PSE.1V3MF1E |
Kingsoft | Win32.Hack.Undef.(kcloud) |
ViRobot | Trojan.Win32.Z.Injector.302070 |
Microsoft | Trojan:Win32/Formbook!MTB |
ALYac | Trojan.GenericKD.38008516 |
MAX | malware (ai score=100) |
TrendMicro-HouseCall | TROJ_GEN.R002H0CKC21 |
Ikarus | Win32.Outbreak |
Fortinet | W32/Injector.APR!tr |
Webroot | W32.Injector.Gen |
AVG | Win32:InjectorX-gen [Trj] |
Panda | Trj/CI.A |