Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 20, 2022, 1:16 p.m. | May 20, 2022, 1:24 p.m. |
IP Address | Status | Action |
---|---|---|
109.234.164.72 | Active | Moloch |
162.0.223.36 | Active | Moloch |
164.124.101.2 | Active | Moloch |
198.54.117.211 | Active | Moloch |
213.186.33.5 | Active | Moloch |
23.227.38.74 | Active | Moloch |
23.235.165.144 | Active | Moloch |
3.64.163.50 | Active | Moloch |
34.102.136.180 | Active | Moloch |
54.248.8.29 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.exilings.com/p0ip/?ndlLiZV=yl/dFwJMdSceaWRi0W0NnKfJF9+pX0fjdtGqu/bS1X0jBltUbF2fKROpu7SUx2G3hqZy3uP/&v4at-=1bGdx4LxDxtLS0Up | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.allyouneedstore.xyz/p0ip/?ndlLiZV=CDhfe6DaxWKDNWY2qb2gtTZFP733Xb+Qcka5A5JsfNJiWRSRTH/LqA/CqBIEVVfG4QqIeoQk&v4at-=1bGdx4LxDxtLS0Up&Tj1h=2dmH-tAh | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.allowdrops.xyz/p0ip/?ndlLiZV=bA8/18/o/0iGirBzmXDhFL/OUmmykOiZm3SEC++o+RtQ7W5jFCo6ZADpOn30oLvPwzRp+Tpl&v4at-=1bGdx4LxDxtLS0Up&xABS=FVExIJeH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.hidinginplainsight.digital/p0ip/?ndlLiZV=qukW209GbqUzJ3O6Nt6aMZtsyRSJCKw2PVXi+aAmtwOxY2LUOvtsctYoEUZb5ik+2Z5jFPyL&v4at-=1bGdx4LxDxtLS0Up&jm8e=dzrXEJ20 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.co1l7o8vy.com/p0ip/?ndlLiZV=6TOoXCUBEI00OLJ2v0IkqEYP8Ak7kvqc5z3P/jb0y5Nd3/OUQgmnUWJin0pZyBjcN7Aa6ULf&v4at-=1bGdx4LxDxtLS0Up&SHfH=yVDtERPP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.beamaster.info/p0ip/?ndlLiZV=qxrnwwIJiftwK0JhBIX6gKsCcuRe0nZ8C0jtfWZwP3QVk5QIEhmdc2JROB7F/SAUCcQeAWX+&v4at-=1bGdx4LxDxtLS0Up&hjmJ=GT0PC280 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.cryptomnis.com/p0ip/?ndlLiZV=afYEiXLcgNxv5urPpopWNOSFMUQuzsk1Gi9ko/kZj91YZQe5VTOSuQVdM+qBwUR/OVRTLbsh&v4at-=1bGdx4LxDxtLS0Up&jYkL=4hlti0Jp | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.tjkt8.com/p0ip/?ndlLiZV=/nGvWTz6DV0e/9gpebojwxydOIry15ThwqcEi0r2QdeZ756mjvubiiGf9XIzpvaeRq/0Os6U&v4at-=1bGdx4LxDxtLS0Up&wLOT=-ZvPMplP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.modelofindia.com/p0ip/?ndlLiZV=jTnPppuaMZ1HoZ6KzD1Iip5jj11YrkS86uCN+cQfi5Hp16rqQ2XNIby0ZfJ3d8J/Ac2KA5et&v4at-=1bGdx4LxDxtLS0Up&xQGV=0T3lvHfX | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.claris-studio.cloud/p0ip/?ndlLiZV=ZGnBy5Z0ttcTRq4htgRCrece1m8F9IuBR3JJANp8NpQMtcgccah7Tn8PHKe5ox5u+dYNNI9j&v4at-=1bGdx4LxDxtLS0Up&B0lc=t8eT0PpX | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.unleashingyou-lifecoaching.com/p0ip/?ndlLiZV=19lq8R7h13lfkSAyCUuAmCqzZXWAStdmJc/tI8v9Q6E9O8G0co7M14/yVJDsEplNLDGL06UW&v4at-=1bGdx4LxDxtLS0Up&tvLg=gbtx6bZH | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.yustunning.com/p0ip/?ndlLiZV=3yWzJACcMRxJ7LW6h/fS39XU15hbhguZ/2QvZyzEvkBMJuj3zWBbm4/rdT02hE/fbh6NSYxA&v4at-=1bGdx4LxDxtLS0Up&tujX=cbRld0AP |
request | GET http://www.exilings.com/p0ip/?ndlLiZV=yl/dFwJMdSceaWRi0W0NnKfJF9+pX0fjdtGqu/bS1X0jBltUbF2fKROpu7SUx2G3hqZy3uP/&v4at-=1bGdx4LxDxtLS0Up |
request | POST http://www.allyouneedstore.xyz/p0ip/ |
request | GET http://www.allyouneedstore.xyz/p0ip/?ndlLiZV=CDhfe6DaxWKDNWY2qb2gtTZFP733Xb+Qcka5A5JsfNJiWRSRTH/LqA/CqBIEVVfG4QqIeoQk&v4at-=1bGdx4LxDxtLS0Up&Tj1h=2dmH-tAh |
request | GET http://www.allowdrops.xyz/p0ip/?ndlLiZV=bA8/18/o/0iGirBzmXDhFL/OUmmykOiZm3SEC++o+RtQ7W5jFCo6ZADpOn30oLvPwzRp+Tpl&v4at-=1bGdx4LxDxtLS0Up&xABS=FVExIJeH |
request | POST http://www.hidinginplainsight.digital/p0ip/ |
request | GET http://www.hidinginplainsight.digital/p0ip/?ndlLiZV=qukW209GbqUzJ3O6Nt6aMZtsyRSJCKw2PVXi+aAmtwOxY2LUOvtsctYoEUZb5ik+2Z5jFPyL&v4at-=1bGdx4LxDxtLS0Up&jm8e=dzrXEJ20 |
request | POST http://www.co1l7o8vy.com/p0ip/ |
request | GET http://www.co1l7o8vy.com/p0ip/?ndlLiZV=6TOoXCUBEI00OLJ2v0IkqEYP8Ak7kvqc5z3P/jb0y5Nd3/OUQgmnUWJin0pZyBjcN7Aa6ULf&v4at-=1bGdx4LxDxtLS0Up&SHfH=yVDtERPP |
request | POST http://www.beamaster.info/p0ip/ |
request | GET http://www.beamaster.info/p0ip/?ndlLiZV=qxrnwwIJiftwK0JhBIX6gKsCcuRe0nZ8C0jtfWZwP3QVk5QIEhmdc2JROB7F/SAUCcQeAWX+&v4at-=1bGdx4LxDxtLS0Up&hjmJ=GT0PC280 |
request | POST http://www.cryptomnis.com/p0ip/ |
request | GET http://www.cryptomnis.com/p0ip/?ndlLiZV=afYEiXLcgNxv5urPpopWNOSFMUQuzsk1Gi9ko/kZj91YZQe5VTOSuQVdM+qBwUR/OVRTLbsh&v4at-=1bGdx4LxDxtLS0Up&jYkL=4hlti0Jp |
request | POST http://www.tjkt8.com/p0ip/ |
request | GET http://www.tjkt8.com/p0ip/?ndlLiZV=/nGvWTz6DV0e/9gpebojwxydOIry15ThwqcEi0r2QdeZ756mjvubiiGf9XIzpvaeRq/0Os6U&v4at-=1bGdx4LxDxtLS0Up&wLOT=-ZvPMplP |
request | POST http://www.modelofindia.com/p0ip/ |
request | GET http://www.modelofindia.com/p0ip/?ndlLiZV=jTnPppuaMZ1HoZ6KzD1Iip5jj11YrkS86uCN+cQfi5Hp16rqQ2XNIby0ZfJ3d8J/Ac2KA5et&v4at-=1bGdx4LxDxtLS0Up&xQGV=0T3lvHfX |
request | POST http://www.claris-studio.cloud/p0ip/ |
request | GET http://www.claris-studio.cloud/p0ip/?ndlLiZV=ZGnBy5Z0ttcTRq4htgRCrece1m8F9IuBR3JJANp8NpQMtcgccah7Tn8PHKe5ox5u+dYNNI9j&v4at-=1bGdx4LxDxtLS0Up&B0lc=t8eT0PpX |
request | POST http://www.unleashingyou-lifecoaching.com/p0ip/ |
request | GET http://www.unleashingyou-lifecoaching.com/p0ip/?ndlLiZV=19lq8R7h13lfkSAyCUuAmCqzZXWAStdmJc/tI8v9Q6E9O8G0co7M14/yVJDsEplNLDGL06UW&v4at-=1bGdx4LxDxtLS0Up&tvLg=gbtx6bZH |
request | POST http://www.yustunning.com/p0ip/ |
request | GET http://www.yustunning.com/p0ip/?ndlLiZV=3yWzJACcMRxJ7LW6h/fS39XU15hbhguZ/2QvZyzEvkBMJuj3zWBbm4/rdT02hE/fbh6NSYxA&v4at-=1bGdx4LxDxtLS0Up&tujX=cbRld0AP |
request | POST http://www.allyouneedstore.xyz/p0ip/ |
request | POST http://www.hidinginplainsight.digital/p0ip/ |
request | POST http://www.co1l7o8vy.com/p0ip/ |
request | POST http://www.beamaster.info/p0ip/ |
request | POST http://www.cryptomnis.com/p0ip/ |
request | POST http://www.tjkt8.com/p0ip/ |
request | POST http://www.modelofindia.com/p0ip/ |
request | POST http://www.claris-studio.cloud/p0ip/ |
request | POST http://www.unleashingyou-lifecoaching.com/p0ip/ |
request | POST http://www.yustunning.com/p0ip/ |
file | C:\Users\test22\AppData\Local\Temp\ycgth.exe |
dead_host | 192.168.56.101:49180 |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Multi.Generic.4!c |
MicroWorld-eScan | Gen:Variant.Jaik.72878 |
FireEye | Generic.mg.c3d24ca1d36fa354 |
ALYac | Gen:Variant.Jaik.72878 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 005930c31 ) |
Alibaba | TrojanSpy:Win32/Lokibot.0b3a872c |
K7GW | Trojan ( 005930c31 ) |
Cybereason | malicious.0558ad |
BitDefenderTheta | Gen:NN.ZexaF.34682.amW@a47h99n |
Cyren | W32/Ninjector.BB.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.ERQU |
TrendMicro-HouseCall | TROJ_GEN.R002H01EI22 |
Paloalto | generic.ml |
Cynet | Malicious (score: 100) |
Kaspersky | HEUR:Trojan-Spy.Win32.Noon.gen |
BitDefender | Gen:Variant.Jaik.72878 |
Avast | Win32:InjectorX-gen [Trj] |
Tencent | Win32.Trojan-spy.Noon.Szla |
Ad-Aware | Gen:Variant.Jaik.72878 |
Emsisoft | Gen:Variant.Jaik.72878 (B) |
DrWeb | Trojan.Siggen17.52991 |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.fc |
Sophos | Mal/Generic-S |
APEX | Malicious |
Jiangmin | Trojan.Fsysna.niy |
Avira | TR/AD.Swotter.ocnfn |
MAX | malware (ai score=99) |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Gridinsoft | Ransom.Win32.Sabsik.oa!s1 |
Microsoft | Trojan:Win32/Lokibot.ANRI!MTB |
GData | Win32.Trojan.Agent.5DOBUH |
McAfee | RDN/Generic.tfr |
VBA32 | BScope.Trojan.Winlock |
Malwarebytes | Spyware.FormBook |
Rising | Trojan.Generic@AI.87 (RDML:uB/HMISO/kAlEKStPXElHA) |
SentinelOne | Static AI - Suspicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/ERQU!tr |
AVG | Win32:InjectorX-gen [Trj] |
CrowdStrike | win/malicious_confidence_100% (W) |