Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 27, 2023, 10:18 a.m. | March 27, 2023, 10:33 a.m. |
IP Address | Status | Action |
---|---|---|
104.21.33.97 | Active | Moloch |
133.167.73.73 | Active | Moloch |
154.64.92.27 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.255.33.179 | Active | Moloch |
193.32.208.67 | Active | Moloch |
199.59.243.222 | Active | Moloch |
212.192.29.71 | Active | Moloch |
34.117.26.57 | Active | Moloch |
38.85.254.111 | Active | Moloch |
67.21.71.208 | Active | Moloch |
82.180.130.211 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.kurodamisato.com/poub/?URihc=pzUirgwcC8ZpUBJr+A0RncrQCBC5BD7ORQWA7LzWHhCGPilCbFeR5IDOxd+JD96H8p3TlQQD&UfrDQp=0nMpq42x5z-hI250 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.edfitzgerald.org/poub/?URihc=QVBI8lnr7lJPqe8zZjldHkvXw89c/iSzMuEXgZLKqCpuoCkUYVUB7rTOcZCo9GOBqMOIvt9n&UfrDQp=0nMpq42x5z-hI250 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.bekansas.com/poub/?URihc=ik78GElzcTPK51jxwI7ODOjVUTh6arreOcAO6JZZFiJW++RN8P/8RIGVM8jA8ec1Ygwfy9iv&UfrDQp=0nMpq42x5z-hI250 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.drzjup.space/poub/?URihc=40Bx8EyWv8P+i1Jftv0PhY/pDmItvHshlkY6DW3zkQKyS/2JCbpjIli9ng3IcYNCUXNlH95B&UfrDQp=0nMpq42x5z-hI250 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.kcgjz.top/poub/?URihc=FfiSjh2CtBpF3CrFZO/zKMlUrmL7FaiyKpfrvTrGvt9QCH6w6Rg7EpGJxpSWT1DMVUaM39xc&UfrDQp=0nMpq42x5z-hI250 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.crusadia.net/poub/?URihc=BYWI1ybJrJc11tuYbuPv66f3H3Cr5zuGlkVqrCbrO2SRjMGFR+aqTisH+sImtYdY9S5ZKg1z&UfrDQp=0nMpq42x5z-hI250 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ppparadise.xyz/poub/?URihc=i6ZHXvJJgvAHiqvTYC5qSpD7hgu0rSUqSG8Zc0xosq5TTXlRT+6NyQltuj8FIZG0zF3lAY7M&UfrDQp=0nMpq42x5z-hI250 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.asu4tqr.icu/poub/?URihc=hHEijVrY0zBLr3JvSJmcy3GyPiWWfZaI2s16j7nKHpxVgJKtjZbonCFGp4fNRYCDH6FUX0AO&UfrDQp=0nMpq42x5z-hI250 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.577hcc.com/poub/?URihc=+hZRLA5mezg8QGtKPd8YzpNrIKXVB9ucHjeJAdH+TFhtM6TJX5/L40TNomU2z2juM0GLcBEZ&UfrDQp=0nMpq42x5z-hI250 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.peiphitan.com/poub/?URihc=ATAcuLZUC31KidgcYb19mFWjhNBYfyBOUVVLHyPrp+l/4SglTnRQ0k7NA0aYiC9nx29Ko6aV&UfrDQp=0nMpq42x5z-hI250 |
request | GET http://www.kurodamisato.com/poub/?URihc=pzUirgwcC8ZpUBJr+A0RncrQCBC5BD7ORQWA7LzWHhCGPilCbFeR5IDOxd+JD96H8p3TlQQD&UfrDQp=0nMpq42x5z-hI250 |
request | GET http://www.edfitzgerald.org/poub/?URihc=QVBI8lnr7lJPqe8zZjldHkvXw89c/iSzMuEXgZLKqCpuoCkUYVUB7rTOcZCo9GOBqMOIvt9n&UfrDQp=0nMpq42x5z-hI250 |
request | GET http://www.bekansas.com/poub/?URihc=ik78GElzcTPK51jxwI7ODOjVUTh6arreOcAO6JZZFiJW++RN8P/8RIGVM8jA8ec1Ygwfy9iv&UfrDQp=0nMpq42x5z-hI250 |
request | GET http://www.drzjup.space/poub/?URihc=40Bx8EyWv8P+i1Jftv0PhY/pDmItvHshlkY6DW3zkQKyS/2JCbpjIli9ng3IcYNCUXNlH95B&UfrDQp=0nMpq42x5z-hI250 |
request | GET http://www.kcgjz.top/poub/?URihc=FfiSjh2CtBpF3CrFZO/zKMlUrmL7FaiyKpfrvTrGvt9QCH6w6Rg7EpGJxpSWT1DMVUaM39xc&UfrDQp=0nMpq42x5z-hI250 |
request | GET http://www.crusadia.net/poub/?URihc=BYWI1ybJrJc11tuYbuPv66f3H3Cr5zuGlkVqrCbrO2SRjMGFR+aqTisH+sImtYdY9S5ZKg1z&UfrDQp=0nMpq42x5z-hI250 |
request | GET http://www.ppparadise.xyz/poub/?URihc=i6ZHXvJJgvAHiqvTYC5qSpD7hgu0rSUqSG8Zc0xosq5TTXlRT+6NyQltuj8FIZG0zF3lAY7M&UfrDQp=0nMpq42x5z-hI250 |
request | GET http://www.asu4tqr.icu/poub/?URihc=hHEijVrY0zBLr3JvSJmcy3GyPiWWfZaI2s16j7nKHpxVgJKtjZbonCFGp4fNRYCDH6FUX0AO&UfrDQp=0nMpq42x5z-hI250 |
request | GET http://www.577hcc.com/poub/?URihc=+hZRLA5mezg8QGtKPd8YzpNrIKXVB9ucHjeJAdH+TFhtM6TJX5/L40TNomU2z2juM0GLcBEZ&UfrDQp=0nMpq42x5z-hI250 |
request | GET http://www.peiphitan.com/poub/?URihc=ATAcuLZUC31KidgcYb19mFWjhNBYfyBOUVVLHyPrp+l/4SglTnRQ0k7NA0aYiC9nx29Ko6aV&UfrDQp=0nMpq42x5z-hI250 |
domain | www.kcgjz.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Local\Temp\wqtgp.exe |
dead_host | 67.21.71.208:80 |
Lionic | Trojan.Win32.Agent.tshg |
MicroWorld-eScan | Gen:Variant.Nemesis.1976 |
FireEye | Generic.mg.c1b465d96c0541a5 |
ALYac | Gen:Variant.Lazy.264429 |
Malwarebytes | Generic.Malware/Suspicious |
Sangfor | Suspicious.Win32.Save.ins |
Alibaba | TrojanSpy:Application/ObfusInjector.53f438d6 |
CrowdStrike | win/malicious_confidence_100% (D) |
Arcabit | Trojan.Nemesis.D7B8 [many] |
BitDefenderTheta | Gen:NN.ZexaF.36344.fmW@aqiWmff |
Symantec | Packed.NSISPacker!g14 |
Elastic | malicious (high confidence) |
APEX | Malicious |
Paloalto | generic.ml |
Cynet | Malicious (score: 100) |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Gen:Variant.Nemesis.1976 |
Avast | FileRepMalware [Pws] |
Sophos | Mal/Generic-S |
F-Secure | Heuristic.HEUR/AGEN.1363367 |
VIPRE | Gen:Variant.Nemesis.1976 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dc |
Trapmine | malicious.moderate.ml.score |
Emsisoft | Gen:Variant.Nemesis.1976 (B) |
SentinelOne | Static AI - Suspicious PE |
Webroot | W32.Malware.Gen |
Avira | HEUR/AGEN.1337962 |
MAX | malware (ai score=87) |
Microsoft | Trojan:Win32/Casdet!rfn |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Gen:Variant.Lazy.264429 |
Detected | |
McAfee | Artemis!C1B465D96C05 |
Cylance | unsafe |
Ikarus | Trojan-Spy.FormBook |
Fortinet | W32/Injector.NSBE!tr |
AVG | FileRepMalware [Pws] |
Panda | Trj/GdSda.A |