Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 25, 2022, 9:39 a.m. | May 25, 2022, 9:47 a.m. |
-
-
spegyl.exe C:\Users\test22\AppData\Local\Temp\spegyl.exe C:\Users\test22\AppData\Local\Temp\xkdvcet
2836-
spegyl.exe C:\Users\test22\AppData\Local\Temp\spegyl.exe C:\Users\test22\AppData\Local\Temp\xkdvcet
2920
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.ruvedaj.xyz | ||
www.arthamandirialkesindo.com | 103.145.226.120 | |
www.sdfijsdjidf.xyz |
CNAME
parking.namesilo.com
|
64.32.22.102 |
www.cryoablation.xyz | 64.190.63.111 | |
www.zhidao95.com | 134.73.225.58 |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.zhidao95.com/m0d4/?LL0=NAAVMfeqbK0z8vD+Qvzh9xXRUU+fA/5gjMBr3ElO5qTI90nZ+R2ISaurvJy762/h5RKa5fTC&APcPAD=dhItCFUXjf9x | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.sdfijsdjidf.xyz/m0d4/?LL0=qa2HCuehd+OLluEj+ZaoAc9XIsur+rI4EFCYyrG+J7mbG8JHTzLv2WdBKhUJ+7SIbEylXPoH&APcPAD=dhItCFUXjf9x | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.cryoablation.xyz/m0d4/?LL0=YUmoHpfUPyDRMD4vBz5urBozJPl1O97m0DXdDlwENz/Wz1XTyx+p7AJWswgLEjMsRwA+jz0k&APcPAD=dhItCFUXjf9x | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.arthamandirialkesindo.com/m0d4/?LL0=mf1bYp/FUP+Ts7S79apP1hkr0w8WZdLzLYn+xRmG0PkAZk5rfm9mwOwUYcGgvUO+IESzcMgd&APcPAD=dhItCFUXjf9x |
request | GET http://www.zhidao95.com/m0d4/?LL0=NAAVMfeqbK0z8vD+Qvzh9xXRUU+fA/5gjMBr3ElO5qTI90nZ+R2ISaurvJy762/h5RKa5fTC&APcPAD=dhItCFUXjf9x |
request | GET http://www.sdfijsdjidf.xyz/m0d4/?LL0=qa2HCuehd+OLluEj+ZaoAc9XIsur+rI4EFCYyrG+J7mbG8JHTzLv2WdBKhUJ+7SIbEylXPoH&APcPAD=dhItCFUXjf9x |
request | GET http://www.cryoablation.xyz/m0d4/?LL0=YUmoHpfUPyDRMD4vBz5urBozJPl1O97m0DXdDlwENz/Wz1XTyx+p7AJWswgLEjMsRwA+jz0k&APcPAD=dhItCFUXjf9x |
request | GET http://www.arthamandirialkesindo.com/m0d4/?LL0=mf1bYp/FUP+Ts7S79apP1hkr0w8WZdLzLYn+xRmG0PkAZk5rfm9mwOwUYcGgvUO+IESzcMgd&APcPAD=dhItCFUXjf9x |
file | C:\Users\test22\AppData\Local\Temp\spegyl.exe |
Lionic | Trojan.Multi.Generic.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | MemScan:Trojan.GenericKDZ.88086 |
ALYac | Trojan.NSISX.Spy.Gen.1 |
Cylance | Unsafe |
CrowdStrike | win/malicious_confidence_90% (W) |
Alibaba | Trojan:Win32/NSISInject.d4c72411 |
K7GW | Trojan ( 0059353a1 ) |
Arcabit | Trojan.NSISX.Spy.Gen.1 |
BitDefenderTheta | Gen:NN.ZexaF.34682.imW@aKvVgGk |
Cyren | W32/Injector.AXL.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ERRO |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan.Win32.Injexa.gen |
BitDefender | MemScan:Trojan.GenericKDZ.88086 |
Avast | Win32:InjectorX-gen [Trj] |
Emsisoft | MemScan:Trojan.GenericKDZ.88086 (B) |
TrendMicro | TROJ_GEN.R002C0DEO22 |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.dc |
SentinelOne | Static AI - Suspicious PE |
FireEye | MemScan:Trojan.GenericKDZ.88086 |
Sophos | Mal/Generic-S |
Ikarus | Trojan-Spy.Agent |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Microsoft | Trojan:Win32/FormBook.SM!MTB |
GData | Win32.Trojan.Agent.EKMHPU |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.NSISInject.R493993 |
McAfee | Artemis!E7141CADB71A |
APEX | Malicious |
Rising | Trojan.Generic@AI.88 (RDML:GBYTzDuXDDEpk6PIO3Outw) |
MAX | malware (ai score=84) |
Fortinet | W32/Injector.ERQA!tr |
AVG | Win32:InjectorX-gen [Trj] |
Cybereason | malicious.6a673d |