Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 17, 2021, 5:22 p.m. | Nov. 17, 2021, 5:26 p.m. |
IP Address | Status | Action |
---|---|---|
104.21.30.245 | Active | Moloch |
107.152.33.165 | Active | Moloch |
13.250.255.10 | Active | Moloch |
154.196.6.137 | Active | Moloch |
156.230.178.28 | Active | Moloch |
156.235.177.206 | Active | Moloch |
164.124.101.2 | Active | Moloch |
185.111.247.38 | Active | Moloch |
195.201.204.153 | Active | Moloch |
23.227.38.74 | Active | Moloch |
3.64.163.50 | Active | Moloch |
34.102.136.180 | Active | Moloch |
34.80.190.141 | Active | Moloch |
82.194.74.104 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ankitparihar.tech/s564/?DVoh7=qce3mniYJcUhGx6jJjQMypui68ggNYf4/cO+HRHDV2VTi0u3SOO7dhmWmLL1mXoL3jcKGyMD&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.goodfellascandoit.com/s564/?DVoh7=ZwqRkEb4YRudDQ5ao8MwUHoxZPnMRmYHWHgc2VuI9I/AWmS3hl7qr2I2ZaHL5QcQU5yYttSO&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.lo-nen.com/s564/?DVoh7=IoV10A9O9hI6xjd/Eu7xuTiDCqg5LFcSex0dmUHIfcr7tPMxLFFZRdTUSRPxaWdhtzN0wraY&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.productorslleida.cat/s564/?DVoh7=7vabDz73e2nBzFkhscXM1YUiiHdja1EfGByayVmH6y4sIKs7M/TWvQk3EGFoqlqGhGGH9VVQ&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.irlimcastore.com/s564/?DVoh7=tkxI0Mb4LtGWKS3F0F6uiGGSRSKHBaD6YH7HRTUImw9RnBOVaG+V/J3focIq/1NJJ9X8IXvr&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.realitytv.info/s564/?DVoh7=zFCjVjU4JD89Kye1rgvfte5q2HyViySNgPaGPcqg7zhnj9W/GJZy3a1Uiylr3MkqWgTQSH3i&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.krishnaengg.net/s564/?DVoh7=NlM2N+iiFwPSoOT/Rr2+VMHzjg0aPXuW8iNMk7SgAqucDRmRukkc4UYfZernm7k5MkxzPDpj&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.lrzoi.com/s564/?DVoh7=/DnP3brMbYSuodHq+1CqfNqxM6iFwKvfgvTsg7hi5QHuFPK85k4JAi7jkrMCin/3ikeWNIS0&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.gymass.com/s564/?DVoh7=mZz/UD0sXu6NPFw+t/AnerZg+DQ2IFpihByc1oG/U8wldi4ETkat0SIWDqG2aHPqXpodcPrp&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.accoladeleatherco.com/s564/?DVoh7=THangPgtxD5xwoas5y2S8tj4iTZ/CIysvf0w5FQFBkXYtdNoA6jg0UBXoRSeu31uR0gRAIpl&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.darqaftan.com/s564/?DVoh7=JzBuSKaJNb6j5KfT1bFXWjNUE/5oXAoCXlzu9BAxc5PloFX7PVbr115No1e84HoruL7HfMze&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.shyezhuo.com/s564/?DVoh7=2GrapIe6ItaFFknROml73pv0cgwBQmPYZZ7mdImcBQwY3AApWnrpiBowaynuclZYYj7IDedM&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fuli.tech/s564/?DVoh7=9f6qGfOfyDOlMScrH6KKwHJ+2xXQ8xdlAf1yPUDkje30zSjnzLS7xurMqwj7zaj6zJzd0cBy&6l=TlPx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.tuthuocgiadinh.store/s564/?DVoh7=DKK7aaacJqL9nJRf1WUrmc6x0mDq8ntwSfjAo261O7x5yXk6bM/WINMG1mzVKolgsX3t92gZ&6l=TlPx |
request | GET http://www.ankitparihar.tech/s564/?DVoh7=qce3mniYJcUhGx6jJjQMypui68ggNYf4/cO+HRHDV2VTi0u3SOO7dhmWmLL1mXoL3jcKGyMD&6l=TlPx |
request | GET http://www.goodfellascandoit.com/s564/?DVoh7=ZwqRkEb4YRudDQ5ao8MwUHoxZPnMRmYHWHgc2VuI9I/AWmS3hl7qr2I2ZaHL5QcQU5yYttSO&6l=TlPx |
request | GET http://www.lo-nen.com/s564/?DVoh7=IoV10A9O9hI6xjd/Eu7xuTiDCqg5LFcSex0dmUHIfcr7tPMxLFFZRdTUSRPxaWdhtzN0wraY&6l=TlPx |
request | GET http://www.productorslleida.cat/s564/?DVoh7=7vabDz73e2nBzFkhscXM1YUiiHdja1EfGByayVmH6y4sIKs7M/TWvQk3EGFoqlqGhGGH9VVQ&6l=TlPx |
request | GET http://www.irlimcastore.com/s564/?DVoh7=tkxI0Mb4LtGWKS3F0F6uiGGSRSKHBaD6YH7HRTUImw9RnBOVaG+V/J3focIq/1NJJ9X8IXvr&6l=TlPx |
request | GET http://www.realitytv.info/s564/?DVoh7=zFCjVjU4JD89Kye1rgvfte5q2HyViySNgPaGPcqg7zhnj9W/GJZy3a1Uiylr3MkqWgTQSH3i&6l=TlPx |
request | GET http://www.krishnaengg.net/s564/?DVoh7=NlM2N+iiFwPSoOT/Rr2+VMHzjg0aPXuW8iNMk7SgAqucDRmRukkc4UYfZernm7k5MkxzPDpj&6l=TlPx |
request | GET http://www.lrzoi.com/s564/?DVoh7=/DnP3brMbYSuodHq+1CqfNqxM6iFwKvfgvTsg7hi5QHuFPK85k4JAi7jkrMCin/3ikeWNIS0&6l=TlPx |
request | GET http://www.gymass.com/s564/?DVoh7=mZz/UD0sXu6NPFw+t/AnerZg+DQ2IFpihByc1oG/U8wldi4ETkat0SIWDqG2aHPqXpodcPrp&6l=TlPx |
request | GET http://www.accoladeleatherco.com/s564/?DVoh7=THangPgtxD5xwoas5y2S8tj4iTZ/CIysvf0w5FQFBkXYtdNoA6jg0UBXoRSeu31uR0gRAIpl&6l=TlPx |
request | GET http://www.darqaftan.com/s564/?DVoh7=JzBuSKaJNb6j5KfT1bFXWjNUE/5oXAoCXlzu9BAxc5PloFX7PVbr115No1e84HoruL7HfMze&6l=TlPx |
request | GET http://www.shyezhuo.com/s564/?DVoh7=2GrapIe6ItaFFknROml73pv0cgwBQmPYZZ7mdImcBQwY3AApWnrpiBowaynuclZYYj7IDedM&6l=TlPx |
request | GET http://www.fuli.tech/s564/?DVoh7=9f6qGfOfyDOlMScrH6KKwHJ+2xXQ8xdlAf1yPUDkje30zSjnzLS7xurMqwj7zaj6zJzd0cBy&6l=TlPx |
request | GET http://www.tuthuocgiadinh.store/s564/?DVoh7=DKK7aaacJqL9nJRf1WUrmc6x0mDq8ntwSfjAo261O7x5yXk6bM/WINMG1mzVKolgsX3t92gZ&6l=TlPx |
file | C:\Users\test22\AppData\Local\Temp\nsdE010.tmp\oinzo.dll |
file | C:\Users\test22\AppData\Local\Temp\nsdE010.tmp\oinzo.dll |
Lionic | Trojan.Win32.Androm.4!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
FireEye | Zum.Androm.1 |
Cybereason | malicious.5a2618 |
Cyren | W32/Injector.APR.gen!Eldorado |
Symantec | Packed.Generic.606 |
ESET-NOD32 | a variant of Win32/Injector.EQOA |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Zum.Androm.1 |
MicroWorld-eScan | Zum.Androm.1 |
Emsisoft | Zum.Androm.1 (B) |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.hc |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
MAX | malware (ai score=84) |
Kingsoft | Win32.Troj.Generic_a.a.(kcloud) |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
GData | Zum.Androm.1 |
McAfee | Artemis!7C875245A261 |
Malwarebytes | Trojan.Injector |
Ikarus | Trojan.NSIS.Agent.S |
Fortinet | W32/Injector.APR!tr |