Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Dec. 9, 2022, 10:23 a.m. | Dec. 9, 2022, 10:25 a.m. |
-
aloy64.exe "C:\Users\test22\AppData\Local\Temp\aloy64.exe"
3040
Name | Response | Post-Analysis Lookup |
---|---|---|
apps.identrust.com |
CNAME
a1952.dscq.akamai.net
CNAME
identrust.edgesuite.net
|
23.43.165.66 |
aloyadakmashin.com | 172.67.131.166 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49169 -> 104.21.4.44:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49162 -> 104.21.4.44:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49166 -> 104.21.4.44:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49169 104.21.4.44:443 |
C=US, O=Let's Encrypt, CN=E1 | CN=*.aloyadakmashin.com | 47:62:0b:e6:2b:22:09:25:c2:dd:6e:4c:d7:e3:d6:27:c9:ac:3f:15 |
TLSv1 192.168.56.102:49162 104.21.4.44:443 |
C=US, O=Let's Encrypt, CN=E1 | CN=*.aloyadakmashin.com | 47:62:0b:e6:2b:22:09:25:c2:dd:6e:4c:d7:e3:d6:27:c9:ac:3f:15 |
TLSv1 192.168.56.102:49166 104.21.4.44:443 |
C=US, O=Let's Encrypt, CN=E1 | CN=*.aloyadakmashin.com | 47:62:0b:e6:2b:22:09:25:c2:dd:6e:4c:d7:e3:d6:27:c9:ac:3f:15 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | .gfids |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET https://aloyadakmashin.com/wp-content/chunky/8uODOeX9A6h677hAR_wP4SNeevFUo28JctX6oX0Cyc1RyLjVKgDnzzecFDV1HC81DeYUiU26g4uSuk8HLG7KJ97SjzYuMsNsAIljaKX8tBBhPz2SuQul8jbxWqgrRph5LKUsU1L5nQSG_ND-TIGx6pAfnCWxhIq6WzPCrbjF9TqvNj9M/soup.gif |
request | GET https://aloyadakmashin.com/wp-content/chunky/rDB1NLsu9aUkPE5NGS_57H2NjPwKcJkELAYMrCPRP8APG07YdNMRwmlP4jgrz9k4UzXihBNpdYbMabkKcr08KoABeTtw4TVhXlqVZfsvQh0_7Muf59hT_2girKV1lW50cnbaXgwqawnYLybzElJH587MaijvV3y3BeA0oOYWAzfx5clB/soup.gif |
request | GET https://aloyadakmashin.com/wp-content/chunky/Scx5kV7S-QDBwELo_NP1SZhxgFnvjJWhyfoACcYtM2Xq50J9kS8dZ4yz7p3OM9WdtsnuIfaVeSMplbWvl0Ewj2X9dZ6VHTnEu6aZwB7TTrjaEMc6AiRfWo3eoACQaWLRl4rW--nWZ6w90ypW965LQiswZo0Kq3AS4Bw4BQPqD5IUGcXk/soup.gif |
section | {u'size_of_data': u'0x00011e00', u'virtual_address': u'0x0004e000', u'entropy': 7.415068628157992, u'name': u'.data', u'virtual_size': u'0x000131b8'} | entropy | 7.41506862816 | description | A section with a high entropy has been found |
Lionic | Trojan.Win32.CobaltStrike.4!c |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.1cb5a9c2bc4adfe1 |
McAfee | Artemis!1CB5A9C2BC4A |
CrowdStrike | win/malicious_confidence_100% (W) |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
Kaspersky | UDS:Trojan.Win32.Cobalt.mxi |
McAfee-GW-Edition | BehavesLike.Win64.Generic.fh |
Trapmine | malicious.high.ml.score |
Sophos | Mal/Generic-S |
Webroot | W32.Trojan.Gen |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
ZoneAlarm | UDS:Trojan.Win32.Cobalt.mxi |
Cynet | Malicious (score: 100) |
Rising | Trojan.CobaltStrike!8.EDF2 (CLOUD) |
AVG | Win64:TrojanX-gen [Trj] |
Cybereason | malicious.98da31 |
Avast | Win64:TrojanX-gen [Trj] |