Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | May 19, 2022, 11:11 a.m. | May 19, 2022, 11:13 a.m. |
-
po kipo000903 ( kind122822 ).exe "C:\Users\test22\AppData\Local\Temp\po kipo000903 ( kind122822 ).exe"
1408-
ayyjkoh.exe C:\Users\test22\AppData\Local\Temp\ayyjkoh.exe C:\Users\test22\AppData\Local\Temp\nkhbfy
1336-
ayyjkoh.exe C:\Users\test22\AppData\Local\Temp\ayyjkoh.exe C:\Users\test22\AppData\Local\Temp\nkhbfy
2328-
raserver.exe "C:\Windows\SysWOW64\raserver.exe"
2168
-
-
-
IP Address | Status | Action |
---|---|---|
103.224.182.242 | Active | Moloch |
104.21.73.18 | Active | Moloch |
156.241.118.187 | Active | Moloch |
160.124.149.174 | Active | Moloch |
162.0.216.71 | Active | Moloch |
164.124.101.2 | Active | Moloch |
203.146.252.150 | Active | Moloch |
208.91.197.91 | Active | Moloch |
209.74.108.198 | Active | Moloch |
213.186.33.5 | Active | Moloch |
34.102.136.180 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.manly-inc.net/tgdh/?oXL=T2hyiT4yGRSJySXgvQ92ynvHZeFzcAvRrmHKTRNyhOIVdtUvfNniaBMnD2YE3Kp/ivsTupKs&GFNL6=9rzX0zMPGJe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.progress-storage.com/tgdh/?oXL=1JFI+sqiJ53F/4r74AU6bnX0zMJGF2EjLTuIZSF/OAKO4l5yELQ4TKKxTaKAtUH5lAUlWY7l&GFNL6=9rzX0zMPGJe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.lychee.solutions/tgdh/?oXL=UlKbuswi2Y15wEsv3lQ89d1PQ+7W2P8S37KfK5fMXAO8xBwAZ7A9X+0QBphQ8KC7Yj0SKJjN&GFNL6=9rzX0zMPGJe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.youruaect.com/tgdh/?oXL=tZMPgU44/UyTvdlqydmrTmAWwCRIROfEbKPJDsOmrPCduNJSVa0bYRNrW2VwMflX5av73nuO&GFNL6=9rzX0zMPGJe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.vernshandmade.com/tgdh/?oXL=bQnQKnB1Ss+iIFTY4P53xmPXEpjrMWsWSs3GF18+WwXvqWynx9MRCd3hJcujecrJ+mv2Gevf&GFNL6=9rzX0zMPGJe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.disneyy.online/tgdh/?oXL=yTnVb2tg7ARKFX050KVe//mT5Ff12juh011QKHkYix65bxDVqf807Xrt0Hcx6eNyVazFzzpR&GFNL6=9rzX0zMPGJe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.smonique.com/tgdh/?oXL=6IzDNvq36e1W8CiJ1NlVZuy5vYNCYHHTzCVE35nOSEe2qUNdEDdqHjuFWccjs6VEiGwwaE+o&GFNL6=9rzX0zMPGJe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.socialcrayons.com/tgdh/?oXL=AkIp2eED1pFiXkYOGYOKBgSrvoJlM7uPGyhWbVOCo5bSOQOUdmVeAfL8gFnbOTwfh1JuFvs5&GFNL6=9rzX0zMPGJe&5yJZ=qPX87RDh | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.stickscollar.com/tgdh/?oXL=acGlUfVkWmWVflw+xL35pCNy6pbIrLuDAngQu8VWTg1Pd/+K/gQWDJIUeRN5jeJoZfAMJ4xt&GFNL6=9rzX0zMPGJe&NHpC=KtxXAba0 |
request | GET http://www.manly-inc.net/tgdh/?oXL=T2hyiT4yGRSJySXgvQ92ynvHZeFzcAvRrmHKTRNyhOIVdtUvfNniaBMnD2YE3Kp/ivsTupKs&GFNL6=9rzX0zMPGJe |
request | GET http://www.progress-storage.com/tgdh/?oXL=1JFI+sqiJ53F/4r74AU6bnX0zMJGF2EjLTuIZSF/OAKO4l5yELQ4TKKxTaKAtUH5lAUlWY7l&GFNL6=9rzX0zMPGJe |
request | GET http://www.lychee.solutions/tgdh/?oXL=UlKbuswi2Y15wEsv3lQ89d1PQ+7W2P8S37KfK5fMXAO8xBwAZ7A9X+0QBphQ8KC7Yj0SKJjN&GFNL6=9rzX0zMPGJe |
request | GET http://www.youruaect.com/tgdh/?oXL=tZMPgU44/UyTvdlqydmrTmAWwCRIROfEbKPJDsOmrPCduNJSVa0bYRNrW2VwMflX5av73nuO&GFNL6=9rzX0zMPGJe |
request | GET http://www.vernshandmade.com/tgdh/?oXL=bQnQKnB1Ss+iIFTY4P53xmPXEpjrMWsWSs3GF18+WwXvqWynx9MRCd3hJcujecrJ+mv2Gevf&GFNL6=9rzX0zMPGJe |
request | GET http://www.disneyy.online/tgdh/?oXL=yTnVb2tg7ARKFX050KVe//mT5Ff12juh011QKHkYix65bxDVqf807Xrt0Hcx6eNyVazFzzpR&GFNL6=9rzX0zMPGJe |
request | GET http://www.smonique.com/tgdh/?oXL=6IzDNvq36e1W8CiJ1NlVZuy5vYNCYHHTzCVE35nOSEe2qUNdEDdqHjuFWccjs6VEiGwwaE+o&GFNL6=9rzX0zMPGJe |
request | POST http://www.socialcrayons.com/tgdh/ |
request | GET http://www.socialcrayons.com/tgdh/?oXL=AkIp2eED1pFiXkYOGYOKBgSrvoJlM7uPGyhWbVOCo5bSOQOUdmVeAfL8gFnbOTwfh1JuFvs5&GFNL6=9rzX0zMPGJe&5yJZ=qPX87RDh |
request | POST http://www.stickscollar.com/tgdh/ |
request | GET http://www.stickscollar.com/tgdh/?oXL=acGlUfVkWmWVflw+xL35pCNy6pbIrLuDAngQu8VWTg1Pd/+K/gQWDJIUeRN5jeJoZfAMJ4xt&GFNL6=9rzX0zMPGJe&NHpC=KtxXAba0 |
request | POST http://www.socialcrayons.com/tgdh/ |
request | POST http://www.stickscollar.com/tgdh/ |
file | C:\Users\test22\AppData\Local\Temp\ayyjkoh.exe |
file | C:\Users\test22\AppData\Local\Temp\ayyjkoh.exe |
file | C:\Users\test22\AppData\Local\Temp\ayyjkoh.exe |
dead_host | 160.124.149.174:80 |
Bkav | W32.AIDetect.malware1 |
Lionic | Trojan.Multi.Generic.4!c |
DrWeb | Trojan.Siggen17.52383 |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.4 |
FireEye | Generic.mg.22bde89a8afcad74 |
ALYac | Trojan.NSISX.Spy.Gen.4 |
Cylance | Unsafe |
Sangfor | [NULLSOFT PIMP INSTALL SYSTEM2] |
K7GW | Trojan ( 00592f011 ) |
Cybereason | malicious.372aca |
Arcabit | Trojan.NSISX.Spy.Gen.4 |
Cyren | W32/Trojan.QQUK-5462 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.ERQP |
TrendMicro-HouseCall | TROJ_GEN.R002H0DEH22 |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-Spy.Win32.Noon.gen |
BitDefender | Trojan.NSISX.Spy.Gen.4 |
Avast | Win32:InjectorX-gen [Trj] |
Tencent | Win32.Trojan-spy.Noon.Hqvt |
Emsisoft | Trojan.NSISX.Spy.Gen.4 (B) |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.cc |
SentinelOne | Static AI - Malicious PE |
Sophos | Mal/Generic-S |
Ikarus | Trojan-Spy.Agent |
Avira | TR/AD.Swotter.qzqip |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Gridinsoft | Trojan.Win32.Downloader.sa |
Microsoft | Trojan:Win32/Lokibot.ANRF!MTB |
GData | Win32.Trojan.PSE.Z3NZES |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.NSISInject.R492809 |
McAfee | RDN/Generic.dx |
VBA32 | BScope.Trojan.Winlock |
Malwarebytes | Trojan.Injector |
APEX | Malicious |
Rising | Trojan.Injector!8.C4 (CLOUD) |
MAX | malware (ai score=87) |
Fortinet | W32/Agent.ERNF!tr |
AVG | Win32:InjectorX-gen [Trj] |
CrowdStrike | win/malicious_confidence_100% (W) |