Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 27, 2023, 10:46 a.m. | March 27, 2023, 10:48 a.m. |
-
Lamb.pif.exe "C:\Users\test22\AppData\Local\Temp\Lamb.pif.exe"
1960
IP Address | Status | Action |
---|---|---|
121.254.136.27 | Active | Moloch |
142.250.199.78 | Active | Moloch |
142.250.204.67 | Active | Moloch |
142.250.207.67 | Active | Moloch |
142.250.207.78 | Active | Moloch |
142.250.66.36 | Active | Moloch |
142.250.66.67 | Active | Moloch |
142.251.220.1 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.217.24.227 | Active | Moloch |
172.217.24.74 | Active | Moloch |
172.217.31.13 | Active | Moloch |
34.120.48.173 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.103:49171 172.217.24.74:443 |
None | None | None |
TLS 1.3 192.168.56.103:49165 172.217.31.13:443 |
None | None | None |
TLS 1.3 192.168.56.103:49164 172.217.24.227:443 |
None | None | None |
TLS 1.3 192.168.56.103:49162 142.250.66.36:443 |
None | None | None |
TLS 1.3 192.168.56.103:49167 34.120.48.173:443 |
None | None | None |
TLS 1.3 192.168.56.103:49166 172.217.24.227:443 |
None | None | None |
TLS 1.3 192.168.56.103:49177 142.250.199.78:443 |
None | None | None |
TLS 1.3 192.168.56.103:49172 142.250.207.67:443 |
None | None | None |
TLS 1.3 192.168.56.103:49176 142.250.66.67:443 |
None | None | None |
TLS 1.3 192.168.56.103:49179 142.250.204.67:443 |
None | None | None |
TLS 1.3 192.168.56.103:49180 142.251.220.1:443 |
None | None | None |
TLS 1.3 192.168.56.103:49163 142.250.66.36:443 |
None | None | None |
TLS 1.3 192.168.56.103:49173 142.250.207.67:443 |
None | None | None |
TLS 1.3 192.168.56.103:49181 172.217.31.14:443 |
None | None | None |
UNDETERMINED 192.168.56.103:49174 142.250.207.67:443 |
None | None | None |
section | =MYCLtLD |
section | 8uSxWUy5 |
section | UgMTkb-g |
section | $hpj638x |
section | b#+@I;)e |
section | KAf`a_(X |
section | LS0&wof1 |
section | F>?*mUav |
section | tlhmKye` |
section | cGghv*c8 |
section | t>e:DuJP |
section | Fm"luw6f |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET http://clients2.google.com/time/1/current?cup2key=4:3305170296&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
request | GET http://www.gstatic.com/generate_204 |
section | {u'size_of_data': u'0x000ad400', u'virtual_address': u'0x00141000', u'entropy': 7.64620417503406, u'name': u'UgMTkb-g', u'virtual_size': u'0x000ad2ac'} | entropy | 7.64620417503 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00001c00', u'virtual_address': u'0x0024f000', u'entropy': 7.018512721230526, u'name': u'KAf`a_(X', u'virtual_size': u'0x00001a14'} | entropy | 7.01851272123 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x005a8600', u'virtual_address': u'0x00253000', u'entropy': 7.936042109646909, u'name': u'tlhmKye`', u'virtual_size': u'0x005a84a9'} | entropy | 7.93604210965 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x0056da00', u'virtual_address': u'0x007fd000', u'entropy': 7.944125803372303, u'name': u't>e:DuJP', u'virtual_size': u'0x0056d970'} | entropy | 7.94412580337 | description | A section with a high entropy has been found | |||||||||
entropy | 0.871911738108 | description | Overall entropy of this PE file is high |
host | 142.250.204.67 | |||
host | 142.250.207.78 |
Lionic | Trojan.Win32.Strab.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.66098180 |
McAfee | Artemis!581176025EB8 |
Sangfor | Trojan.Win32.Agent.Vkkk |
K7AntiVirus | Trojan ( 005a17621 ) |
Alibaba | Trojan:Win32/Strab.818151b6 |
K7GW | Trojan ( 005a17621 ) |
CrowdStrike | win/malicious_confidence_70% (W) |
Symantec | Trojan.Gen.MBT |
ESET-NOD32 | a variant of Generik.MSQCKTL |
Avast | Win32:Evo-gen [Trj] |
Cynet | Malicious (score: 99) |
Kaspersky | Trojan.Win32.Strab.bct |
BitDefender | Trojan.GenericKD.66098180 |
Tencent | Win32.Trojan.FalseSign.Nsmw |
VIPRE | Trojan.GenericKD.66098180 |
McAfee-GW-Edition | Artemis!Trojan |
FireEye | Trojan.GenericKD.66098180 |
Emsisoft | Trojan.GenericKD.66098180 (B) |
GData | Trojan.GenericKD.66098180 |
Webroot | W32.Trojan.Gen |
Avira | TR/Redcap.pepza |
MAX | malware (ai score=86) |
Antiy-AVL | Trojan/Win32.Wacatac |
Gridinsoft | Trojan.Heur!.00212031 |
Xcitium | Malware@#tymsne84ancj |
Arcabit | Trojan.Generic.D3F09404 |
Microsoft | Trojan:Win32/Wacatac.B!ml |
ALYac | Trojan.GenericKD.66098180 |
VBA32 | BScope.Backdoor.Agent |
TrendMicro-HouseCall | TROJ_GEN.R03BH0CCQ23 |
Rising | Trojan.Undefined!8.1327C (TFE:5:KlBGkNsNMRQ) |
Fortinet | W32/PossibleThreat |
BitDefenderTheta | Gen:NN.ZexaCO.36344.@Z2@aKcgWanG |
AVG | Win32:Evo-gen [Trj] |