Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | May 20, 2022, 10:33 a.m. | May 20, 2022, 10:51 a.m. |
-
-
rzopgh.exe C:\Users\test22\AppData\Local\Temp\rzopgh.exe C:\Users\test22\AppData\Local\Temp\ujuuvnnqw
2400-
rzopgh.exe C:\Users\test22\AppData\Local\Temp\rzopgh.exe C:\Users\test22\AppData\Local\Temp\ujuuvnnqw
2472
-
-
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.mitrachocloud.com/ud5f/?NXeTz=dvPOeeOMFyRe5DlDhcEIH/wWv29SUESn2RfxJ6FzLkAlPBveMi7awguc7ngn9aDQsIqt875z&UlSp=GVgT1hYhBj_tmD | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.trinityhomesolutionsok.com/ud5f/?NXeTz=d4rw7sxjDzEtx0cWy9KhsrAKz6NcO/dyweSsDbp+XQjURwGxqf7SQIXUSnVgZkPR6XcgGAI2&UlSp=GVgT1hYhBj_tmD | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.topings33.com/ud5f/?NXeTz=P+kGyZmw/z1ZAcm1xeipQpdUp3lv0Y7Tq/O4l4d0IAxx4Y1WARDjicwyInmPULGK5Gjn0H9W&UlSp=GVgT1hYhBj_tmD | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.bupabii.site/ud5f/?NXeTz=ALfx5VHPAmLJvR2PmDqxYgHynhZL+44fq/2dYcj3tIi9cyGy7ldYS7x5wMMPmf8J2NKK6TeT&UlSp=GVgT1hYhBj_tmD&TYIw=2deHz4Lp | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.beam-birds.com/ud5f/?NXeTz=ncbEUbCk5kXcAL9fRpg+ceSXdryDB81gU2FCCsNIW8XHrZFrTQ1tXPDPVckwIBJ0r5CrHMmR&UlSp=GVgT1hYhBj_tmD&Ab0L=OVODAhqH |
request | GET http://www.mitrachocloud.com/ud5f/?NXeTz=dvPOeeOMFyRe5DlDhcEIH/wWv29SUESn2RfxJ6FzLkAlPBveMi7awguc7ngn9aDQsIqt875z&UlSp=GVgT1hYhBj_tmD |
request | GET http://www.trinityhomesolutionsok.com/ud5f/?NXeTz=d4rw7sxjDzEtx0cWy9KhsrAKz6NcO/dyweSsDbp+XQjURwGxqf7SQIXUSnVgZkPR6XcgGAI2&UlSp=GVgT1hYhBj_tmD |
request | GET http://www.topings33.com/ud5f/?NXeTz=P+kGyZmw/z1ZAcm1xeipQpdUp3lv0Y7Tq/O4l4d0IAxx4Y1WARDjicwyInmPULGK5Gjn0H9W&UlSp=GVgT1hYhBj_tmD |
request | POST http://www.bupabii.site/ud5f/ |
request | GET http://www.bupabii.site/ud5f/?NXeTz=ALfx5VHPAmLJvR2PmDqxYgHynhZL+44fq/2dYcj3tIi9cyGy7ldYS7x5wMMPmf8J2NKK6TeT&UlSp=GVgT1hYhBj_tmD&TYIw=2deHz4Lp |
request | POST http://www.beam-birds.com/ud5f/ |
request | GET http://www.beam-birds.com/ud5f/?NXeTz=ncbEUbCk5kXcAL9fRpg+ceSXdryDB81gU2FCCsNIW8XHrZFrTQ1tXPDPVckwIBJ0r5CrHMmR&UlSp=GVgT1hYhBj_tmD&Ab0L=OVODAhqH |
request | POST http://www.bupabii.site/ud5f/ |
request | POST http://www.beam-birds.com/ud5f/ |
file | C:\Users\test22\AppData\Local\Temp\rzopgh.exe |
dead_host | 49.0.246.21:80 |
Lionic | Trojan.Multi.Generic.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.1 |
FireEye | Generic.mg.e2af2968f48cda47 |
ALYac | Trojan.GenericKD.50299726 |
Cylance | Unsafe |
Sangfor | [NULLSOFT PIMP INSTALL SYSTEM2] |
K7AntiVirus | Trojan ( 00592e741 ) |
BitDefender | Trojan.NSISX.Spy.Gen.1 |
K7GW | Trojan ( 00592e741 ) |
Cybereason | malicious.d61778 |
Cyren | W32/Trojan.QQUK-5462 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ERQK |
APEX | Malicious |
Paloalto | generic.ml |
Cynet | Malicious (score: 100) |
Kaspersky | HEUR:Trojan-Spy.Win32.Noon.gen |
Alibaba | Trojan:Win32/Injector.40783d77 |
Rising | Trojan.Injector!8.C4 (CLOUD) |
Sophos | Mal/Generic-S |
DrWeb | Trojan.Siggen17.52482 |
McAfee-GW-Edition | BehavesLike.Win32.ICLoader.dc |
Emsisoft | Trojan.NSISX.Spy.Gen.1 (B) |
Ikarus | Trojan-Spy.Agent |
Avira | TR/AD.Swotter.ucgwi |
Gridinsoft | Ransom.Win32.Sabsik.sa |
ViRobot | Trojan.Win32.Z.Injector.236534 |
GData | Trojan.GenericKD.50299726 |
AhnLab-V3 | Trojan/Win.NSISInject.R492809 |
McAfee | RDN/Generic PWS.y |
MAX | malware (ai score=87) |
Malwarebytes | Trojan.Injector |
SentinelOne | Static AI - Malicious PE |
Fortinet | W32/Injector.ERQA!tr |
CrowdStrike | win/malicious_confidence_100% (W) |