Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | May 25, 2022, 9:39 a.m. | May 25, 2022, 9:42 a.m. |
-
-
xhmmdm.exe C:\Users\test22\AppData\Local\Temp\xhmmdm.exe C:\Users\test22\AppData\Local\Temp\ifrkstg
2436-
xhmmdm.exe C:\Users\test22\AppData\Local\Temp\xhmmdm.exe C:\Users\test22\AppData\Local\Temp\ifrkstg
2480
-
-
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.nobodylikesbrettmoist.com/pvgu/?LL0=nvz2XLJKHrVEvwOOvqMo23cnB7GA3CSZgzM7NGrnKp2ptYqPI5p79IP3SkhePjy4TC8rMuEe&APcPAD=dhItCFUXjf9x | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.nefitegroup.com/pvgu/?LL0=k+QTDRHdnEtUsHLGQg6Iw1al4pyCYwcayg85U4DqAbua8ytHfL/skunEScp6nz+x3Wk9MXim&APcPAD=dhItCFUXjf9x | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.greks33.com/pvgu/?LL0=ACUuPc1zMBKrdYIrvbcsob0MIhlsilEmDfnJzxGy9WftQ1gsfW8KLuvYNpwg7uiSXw2KvQ9G&APcPAD=dhItCFUXjf9x | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.bigboyd.xyz/pvgu/?LL0=tP0Q3eoZ8OB0n/ihtNtVt/i+uXyKbed/w9CnT/COaGWr+INWB84o8XFICAu+hOQ8GaOP7mYw&APcPAD=dhItCFUXjf9x&24PD=i4MDkZJ8 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.macralace.online/pvgu/?LL0=/TZCjQ47umXByn9Km9kdV8rm5zZ9DN+jmfPnLSP70xRBJX7BCcRCEsQ/uYWqAXXlHiTQYyrd&APcPAD=dhItCFUXjf9x&JEx-=RdoHsb2X |
request | GET http://www.nobodylikesbrettmoist.com/pvgu/?LL0=nvz2XLJKHrVEvwOOvqMo23cnB7GA3CSZgzM7NGrnKp2ptYqPI5p79IP3SkhePjy4TC8rMuEe&APcPAD=dhItCFUXjf9x |
request | GET http://www.nefitegroup.com/pvgu/?LL0=k+QTDRHdnEtUsHLGQg6Iw1al4pyCYwcayg85U4DqAbua8ytHfL/skunEScp6nz+x3Wk9MXim&APcPAD=dhItCFUXjf9x |
request | GET http://www.greks33.com/pvgu/?LL0=ACUuPc1zMBKrdYIrvbcsob0MIhlsilEmDfnJzxGy9WftQ1gsfW8KLuvYNpwg7uiSXw2KvQ9G&APcPAD=dhItCFUXjf9x |
request | POST http://www.bigboyd.xyz/pvgu/ |
request | GET http://www.bigboyd.xyz/pvgu/?LL0=tP0Q3eoZ8OB0n/ihtNtVt/i+uXyKbed/w9CnT/COaGWr+INWB84o8XFICAu+hOQ8GaOP7mYw&APcPAD=dhItCFUXjf9x&24PD=i4MDkZJ8 |
request | POST http://www.macralace.online/pvgu/ |
request | GET http://www.macralace.online/pvgu/?LL0=/TZCjQ47umXByn9Km9kdV8rm5zZ9DN+jmfPnLSP70xRBJX7BCcRCEsQ/uYWqAXXlHiTQYyrd&APcPAD=dhItCFUXjf9x&JEx-=RdoHsb2X |
request | POST http://www.45069.email/pvgu/ |
request | POST http://www.bigboyd.xyz/pvgu/ |
request | POST http://www.macralace.online/pvgu/ |
request | POST http://www.45069.email/pvgu/ |
file | C:\Users\test22\AppData\Local\Temp\xhmmdm.exe |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.1 |
ALYac | Trojan.NSISX.Spy.Gen.1 |
Sangfor | [NULLSOFT PIMP INSTALL SYSTEM2] |
BitDefender | Trojan.NSISX.Spy.Gen.1 |
Cybereason | malicious.9e2cd4 |
Cyren | W32/Injector.AXL.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ERRO |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Rising | Trojan.Generic@AI.88 (RDML:GBYTzDuXDDEpk6PIO3Outw) |
FireEye | Trojan.NSISX.Spy.Gen.1 |
Emsisoft | Trojan.NSISX.Spy.Gen.1 (B) |
SentinelOne | Static AI - Suspicious PE |
GData | Trojan.NSISX.Spy.Gen.1 |
MAX | malware (ai score=82) |
Arcabit | Trojan.NSISX.Spy.Gen.1 |
Microsoft | Trojan:Win32/Formbook!MTB |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.NSISInject.R493993 |
Fortinet | W32/Injector.ERQA!tr |
BitDefenderTheta | Gen:NN.ZexaF.34682.imW@a4!dHDd |
AVG | Win32:InjectorX-gen [Trj] |
Avast | Win32:InjectorX-gen [Trj] |
CrowdStrike | win/malicious_confidence_90% (W) |