Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 11, 2023, 10:27 a.m. | March 11, 2023, 10:29 a.m. |
-
faintxakers.exe "C:\Users\test22\AppData\Local\Temp\faintxakers.exe"
2564
Name | Response | Post-Analysis Lookup |
---|---|---|
pool.hashvault.pro | 131.153.76.130 | |
anaida.evisyn.lol | 104.21.41.183 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2036289 | ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) | Crypto Currency Mining Activity Detected |
TCP 192.168.56.101:49164 -> 104.21.41.183:443 | 906200068 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (CoinMiner) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.101:49165 131.153.76.130:80 |
None | None | None |
TLS 1.3 192.168.56.101:49163 125.253.92.50:80 |
None | None | None |
TLS 1.3 192.168.56.101:49164 104.21.41.183:443 |
None | None | None |
section | {u'size_of_data': u'0x0037e800', u'virtual_address': u'0x0000f000', u'entropy': 7.963368986273371, u'name': u'.data', u'virtual_size': u'0x0037e620'} | entropy | 7.96336898627 | description | A section with a high entropy has been found | |||||||||
entropy | 0.980139706889 | description | Overall entropy of this PE file is high |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Tedy.234724 |
FireEye | Generic.mg.e5714adf276ab96c |
McAfee | Artemis!E5714ADF276A |
Malwarebytes | Malware.AI.463480657 |
VIPRE | Gen:Variant.Tedy.234724 |
Sangfor | Riskware.Win64.Agent.Vgvy |
CrowdStrike | win/malicious_confidence_70% (W) |
Alibaba | Trojan:Win64/CoinMiner.e3d4f9b9 |
Cyren | W64/Agent.FHK.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
Cynet | Malicious (score: 100) |
APEX | Malicious |
ClamAV | Win.Malware.Trojanx-9977539-0 |
Kaspersky | VHO:Trojan.Win64.Miner.lfpq |
BitDefender | Gen:Variant.Tedy.234724 |
Rising | Stealer.Agent!8.C2 (TFE:5:mJL08voCrEL) |
Emsisoft | Gen:Variant.Tedy.234724 (B) |
DrWeb | Trojan.Siggen20.990 |
TrendMicro | TROJ_GEN.R002C0DCA23 |
McAfee-GW-Edition | BehavesLike.Win64.Generic.wc |
Sophos | Generic ML PUA (PUA) |
Ikarus | Trojan.Win64.CoinMiner |
Jiangmin | Trojan.Agent.ehvj |
Webroot | W32.Trojan.Gen |
Avira | HEUR/AGEN.1255492 |
Antiy-AVL | Trojan/Win64.Kryptik |
Arcabit | Trojan.Tedy.D394E4 |
ZoneAlarm | VHO:Trojan.Win64.Miner.lfpq |
Microsoft | Trojan:Win64/CoinMiner.DC!MTB |
Detected | |
AhnLab-V3 | Trojan/Win.Generic.R541225 |
ALYac | Gen:Variant.Tedy.234724 |
MAX | malware (ai score=86) |
TrendMicro-HouseCall | TROJ_GEN.R002C0DCA23 |
Tencent | Win32.Trojan.Agen.Oqil |
Fortinet | W64/Agent.AGENMM!tr |