Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Dec. 10, 2022, 3:02 p.m. | Dec. 10, 2022, 3:04 p.m. |
-
avicapn32.exe "C:\Users\test22\AppData\Local\Temp\avicapn32.exe"
2564
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
45.159.188.118 | Active | Moloch |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49162 -> 45.159.188.118:80 | 2024897 | ET USER_AGENTS Go HTTP Client User-Agent | Misc activity |
TCP 192.168.56.101:49162 -> 45.159.188.118:80 | 2024897 | ET USER_AGENTS Go HTTP Client User-Agent | Misc activity |
TCP 192.168.56.101:49162 -> 45.159.188.118:80 | 2024897 | ET USER_AGENTS Go HTTP Client User-Agent | Misc activity |
TCP 192.168.56.101:49162 -> 45.159.188.118:80 | 2024897 | ET USER_AGENTS Go HTTP Client User-Agent | Misc activity |
Suricata TLS
No Suricata TLS
section | .n3DK0 |
section | .symtab |
section | .n3DK1 |
section | .n3DK2 |
section | .n3DK3 |
suspicious_features | Connection to IP address | suspicious_request | GET http://45.159.188.118/bot/online?guid=test22-PC\test22&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://45.159.188.118/bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 |
request | GET http://45.159.188.118/bot/online?guid=test22-PC\test22&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 |
request | GET http://45.159.188.118/bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 |
section | {u'size_of_data': u'0x00000400', u'virtual_address': u'0x0049b000', u'entropy': 7.503046296882152, u'name': u'.idata', u'virtual_size': u'0x000003dc'} | entropy | 7.50304629688 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00016e00', u'virtual_address': u'0x0049c000', u'entropy': 7.99177812695447, u'name': u'.n3DK0', u'virtual_size': u'0x00016d00'} | entropy | 7.99177812695 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00423a00', u'virtual_address': u'0x004b4000', u'entropy': 7.910937346034141, u'name': u'.n3DK1', u'virtual_size': u'0x00423805'} | entropy | 7.91093734603 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00344600', u'virtual_address': u'0x008d9000', u'entropy': 7.897628881549811, u'name': u'.n3DK3', u'virtual_size': u'0x003445f0'} | entropy | 7.89762888155 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00016200', u'virtual_address': u'0x00c37000', u'entropy': 6.967274615989221, u'name': u'.rsrc', u'virtual_size': u'0x000161ce'} | entropy | 6.96727461599 | description | A section with a high entropy has been found | |||||||||
entropy | 0.6271959937 | description | Overall entropy of this PE file is high |
host | 45.159.188.118 |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.64122460 |
Cylance | Unsafe |
Sangfor | Banker.Win32.Clipbanker.Vs3f |
Alibaba | Trojan:Win32/ClipBanker.491c4b49 |
BitDefenderTheta | Gen:NN.ZexaF.36106.@V1@aCYhf5hi |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of WinGo/ClipBanker.AG |
APEX | Malicious |
Kaspersky | Trojan-Banker.Win32.ClipBanker.wkx |
BitDefender | Trojan.GenericKD.64122460 |
Avast | Win32:TrojanX-gen [Trj] |
Tencent | Win32.Trojan.FalseSign.Gdhl |
Ad-Aware | Trojan.GenericKD.64122460 |
Emsisoft | Trojan.GenericKD.64122460 (B) |
VIPRE | Trojan.GenericKD.64122460 |
McAfee-GW-Edition | Artemis!Trojan |
Trapmine | malicious.moderate.ml.score |
FireEye | Trojan.GenericKD.64122460 |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Cometer |
GData | Win32.Trojan.Agent.CYW14J |
Webroot | W32.Trojan.Gen |
Detected | |
Kingsoft | Win32.Troj.Banker.(kcloud) |
Gridinsoft | Ransom.Win32.Banker.sa |
ZoneAlarm | Trojan-Banker.Win32.ClipBanker.wkx |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
McAfee | Artemis!0F6EF96C5E68 |
MAX | malware (ai score=80) |
Malwarebytes | Malware.Heuristic.1003 |
TrendMicro-HouseCall | TROJ_GEN.R002H0DL822 |
Rising | Trojan.ClipBanker!8.5FB (TFE:1:ZMUnES72JpS) |
Fortinet | W32/PossibleThreat |
AVG | Win32:TrojanX-gen [Trj] |