Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 20, 2022, 10:33 a.m. | May 20, 2022, 10:38 a.m. |
-
-
mujjgudfsx.exe C:\Users\test22\AppData\Local\Temp\mujjgudfsx.exe C:\Users\test22\AppData\Local\Temp\btdkhlgyim
2880-
mujjgudfsx.exe C:\Users\test22\AppData\Local\Temp\mujjgudfsx.exe C:\Users\test22\AppData\Local\Temp\btdkhlgyim
2952
-
-
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.mydiga-angststoerung.com/ud5f/?9r4l2=yFld/JCYBPTDUSphYl1JLHShpmZQOPshqMvqWwFpBif6fy+DcW5/J/qkCYyqtkAAagEMdzHX&EjU4Np=gdM0vL4XuL | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.daskocleaning.com/ud5f/?9r4l2=lK6R7JSYqhab7fserO2ud0UFIeUwIzn6U4Z0uinaNEONfhE6Adu4jwyhJ99+Ck6Dq2P67LuP&EjU4Np=gdM0vL4XuL | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.animefnix.com/ud5f/?9r4l2=pYnsP4TjgnW1+o0bXQyX3o5D0burLT7omwvH8WaVCOfXXYLrtXboQfHSoV7j4k06LzvKDu0l&EjU4Np=gdM0vL4XuL | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.topings33.com/ud5f/?9r4l2=P+kGyZmw/z1ZAcm1xeipQpdUp3lv0Y7Tq/O4l4d0IAxx4Y1WARDjicwyInmPULGK5Gjn0H9W&EjU4Np=gdM0vL4XuL | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.beam-birds.com/ud5f/?9r4l2=ncbEUbCk5kXcAL9fRpg+ceSXdryDB81gU2FCCsNIW8XHrZFrTQ1tXPDPVckwIBJ0r5CrHMmR&EjU4Np=gdM0vL4XuL&Ab0L=K0DLsD1x | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.spaceokara.com/ud5f/?9r4l2=9CmrMn0GGtbXxXIdiJK6yWXZmlYii/OvswjFNfGMD5AzzaTP0I9tRoOX3ga04w9g87gTygof&EjU4Np=gdM0vL4XuL&JwlX=-ZAhxrdx | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.hayatseventeknoloji.com/ud5f/?9r4l2=ojvd2QNoKu4P+or54/aphicVJQ+jWOoKwd10hVUKozBMe5J4PPzzrG2+L/bESfR8P0zdxkWw&EjU4Np=gdM0vL4XuL&GhUR=r0GdcTaP |
request | GET http://www.mydiga-angststoerung.com/ud5f/?9r4l2=yFld/JCYBPTDUSphYl1JLHShpmZQOPshqMvqWwFpBif6fy+DcW5/J/qkCYyqtkAAagEMdzHX&EjU4Np=gdM0vL4XuL |
request | GET http://www.daskocleaning.com/ud5f/?9r4l2=lK6R7JSYqhab7fserO2ud0UFIeUwIzn6U4Z0uinaNEONfhE6Adu4jwyhJ99+Ck6Dq2P67LuP&EjU4Np=gdM0vL4XuL |
request | GET http://www.animefnix.com/ud5f/?9r4l2=pYnsP4TjgnW1+o0bXQyX3o5D0burLT7omwvH8WaVCOfXXYLrtXboQfHSoV7j4k06LzvKDu0l&EjU4Np=gdM0vL4XuL |
request | GET http://www.topings33.com/ud5f/?9r4l2=P+kGyZmw/z1ZAcm1xeipQpdUp3lv0Y7Tq/O4l4d0IAxx4Y1WARDjicwyInmPULGK5Gjn0H9W&EjU4Np=gdM0vL4XuL |
request | POST http://www.beam-birds.com/ud5f/ |
request | GET http://www.beam-birds.com/ud5f/?9r4l2=ncbEUbCk5kXcAL9fRpg+ceSXdryDB81gU2FCCsNIW8XHrZFrTQ1tXPDPVckwIBJ0r5CrHMmR&EjU4Np=gdM0vL4XuL&Ab0L=K0DLsD1x |
request | POST http://www.spaceokara.com/ud5f/ |
request | GET http://www.spaceokara.com/ud5f/?9r4l2=9CmrMn0GGtbXxXIdiJK6yWXZmlYii/OvswjFNfGMD5AzzaTP0I9tRoOX3ga04w9g87gTygof&EjU4Np=gdM0vL4XuL&JwlX=-ZAhxrdx |
request | POST http://www.hayatseventeknoloji.com/ud5f/ |
request | GET http://www.hayatseventeknoloji.com/ud5f/?9r4l2=ojvd2QNoKu4P+or54/aphicVJQ+jWOoKwd10hVUKozBMe5J4PPzzrG2+L/bESfR8P0zdxkWw&EjU4Np=gdM0vL4XuL&GhUR=r0GdcTaP |
request | POST http://www.beam-birds.com/ud5f/ |
request | POST http://www.spaceokara.com/ud5f/ |
request | POST http://www.hayatseventeknoloji.com/ud5f/ |
file | C:\Users\test22\AppData\Local\Temp\mujjgudfsx.exe |
dead_host | 76.164.193.180:80 |
Bkav | W32.AIDetect.malware1 |
Lionic | Trojan.Win32.Injexa.4!c |
MicroWorld-eScan | Gen:Variant.Jaik.72878 |
FireEye | Generic.mg.0d5c12ef90391b5b |
McAfee | RDN/XLoader |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 005930091 ) |
Alibaba | Trojan:Win32/Lokibot.08d2c1e4 |
K7GW | Trojan ( 005930091 ) |
Cybereason | malicious.471aee |
Cyren | W32/Ninjector.BB.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.ERQU |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan.Win32.Injexa.gen |
BitDefender | Gen:Variant.Jaik.72878 |
Avast | Win32:InjectorX-gen [Trj] |
Tencent | Win32.Trojan.Injexa.Gvs |
Ad-Aware | Gen:Variant.Jaik.72878 |
Sophos | Mal/Generic-S |
DrWeb | Trojan.Siggen17.52903 |
TrendMicro | TROJ_FRS.0NA103EJ22 |
McAfee-GW-Edition | BehavesLike.Win32.Vopak.dc |
Emsisoft | Gen:Variant.Jaik.72878 (B) |
Ikarus | Trojan.NSIS.Agent |
Jiangmin | Trojan.Fsysna.niy |
Avira | TR/AD.Swotter.hfluw |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Gridinsoft | Ransom.Win32.Sabsik.oa!s1 |
Microsoft | Trojan:Win32/Lokibot.ANRF!MTB |
GData | Win32.Trojan.Agent.17YGXX |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.NSISInject.R491618 |
BitDefenderTheta | Gen:NN.ZexaF.34682.amW@aePGp@d |
ALYac | Gen:Variant.Jaik.72878 |
MAX | malware (ai score=83) |
VBA32 | BScope.Trojan.Winlock |
Malwarebytes | Trojan.Dropper |
TrendMicro-HouseCall | TROJ_FRS.0NA103EJ22 |
Rising | Trojan.Generic@AI.87 (RDML:1BtgFgBRbwvFU4WhzVnVmw) |
SentinelOne | Static AI - Malicious PE |
Fortinet | W32/Injector.ERQU!tr |
AVG | Win32:InjectorX-gen [Trj] |
CrowdStrike | win/malicious_confidence_100% (W) |