Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 17, 2023, 5:31 p.m. | March 17, 2023, 5:57 p.m. |
-
HDU3.exe "C:\Users\test22\AppData\Local\Temp\HDU3.exe"
2536
Name | Response | Post-Analysis Lookup |
---|---|---|
textbin.net | 148.72.177.212 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 148.72.177.212:443 -> 192.168.56.101:49161 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 192.168.56.101:49161 -> 148.72.177.212:443 | 2037786 | ET INFO Pastebin-style Service (textbin .net in TLS SNI) | Potentially Bad Traffic |
TCP 192.168.56.101:49161 -> 148.72.177.212:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49161 -> 148.72.177.212:443 | 2037786 | ET INFO Pastebin-style Service (textbin .net in TLS SNI) | Potentially Bad Traffic |
TCP 192.168.56.101:49161 -> 148.72.177.212:443 | 2037786 | ET INFO Pastebin-style Service (textbin .net in TLS SNI) | Potentially Bad Traffic |
TCP 192.168.56.101:49161 -> 148.72.177.212:443 | 2037786 | ET INFO Pastebin-style Service (textbin .net in TLS SNI) | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
section | {u'size_of_data': u'0x00086400', u'virtual_address': u'0x000d9000', u'entropy': 7.99886172049686, u'name': u'UPX1', u'virtual_size': u'0x00087000'} | entropy | 7.9988617205 | description | A section with a high entropy has been found | |||||||||
entropy | 0.99721448468 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX | ||||||
section | UPX2 | description | Section name indicates UPX |
MicroWorld-eScan | Trojan.GenericKD.65926958 |
FireEye | Generic.mg.04694e5e78d0a3dc |
CAT-QuickHeal | Trojan.GenericRI.S29850418 |
Malwarebytes | Malware.AI.4287928828 |
Sangfor | Downloader.Win64.Agent.V0q6 |
CrowdStrike | win/malicious_confidence_70% (D) |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | Win64/TrojanDownloader.Agent.XW |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | Trojan-Downloader.Win32.ZippyLoader.eya |
BitDefender | Trojan.GenericKD.65926958 |
ViRobot | Trojan.Win.Z.Dapato.552448 |
Emsisoft | Trojan.GenericKD.65926958 (B) |
TrendMicro | TROJ_GEN.R002C0DCE23 |
McAfee-GW-Edition | BehavesLike.Win64.BadFile.hc |
Trapmine | malicious.moderate.ml.score |
Jiangmin | TrojanDropper.Dapato.adrr |
Avira | TR/Dldr.Agent.tkfbf |
MAX | malware (ai score=89) |
Antiy-AVL | Trojan/Win32.Sabsik |
Gridinsoft | Ransom.Win64.Sabsik.sa |
Microsoft | Trojan:Win32/Dapato.EM!MTB |
GData | Win64.Trojan.Agent.GHXZ6U |
AhnLab-V3 | Trojan/Win.Generic.C5303216 |
McAfee | Artemis!04694E5E78D0 |
TrendMicro-HouseCall | TROJ_GEN.R002C0DCE23 |
Rising | Downloader.Agent!8.B23 (TFE:5:3iivrlo7YP) |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W64/Agent.XW!tr.dldr |