Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | April 16, 2023, 4:13 p.m. | April 16, 2023, 4:23 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
geoplugin.net | 178.237.33.50 | |
jovaneo.duckdns.org | 212.8.244.201 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
TCP 192.168.56.103:49165 -> 212.8.244.201:3641 | 2032776 | ET MALWARE Remcos 3.x Unencrypted Checkin | Malware Command and Control Activity Detected |
TCP 212.8.244.201:3641 -> 192.168.56.103:49165 | 2032777 | ET MALWARE Remcos 3.x Unencrypted Server Response | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://geoplugin.net/json.gp |
domain | jovaneo.duckdns.org |
request | GET http://geoplugin.net/json.gp |
file | C:\Users\test22\AppData\Local\Temp\qrwlz.exe |
file | C:\Users\test22\AppData\Roaming\qavfoktdyie\nwsclgplu.exe |
file | C:\Users\test22\AppData\Local\Temp\qrwlz.exe |
file | C:\Users\test22\AppData\Local\Temp\qrwlz.exe |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\eajsox | reg_value | C:\Users\test22\AppData\Roaming\qavfoktdyie\nwsclgplu.exe "C:\Users\test22\AppData\Local\Temp\qrwlz.exe" C:\Users\test22\AppData\ |
Lionic | Trojan.Win32.Agent.tshg |
MicroWorld-eScan | Trojan.GenericKD.66417496 |
FireEye | Generic.mg.caea33e0d520c8a7 |
ALYac | Trojan.GenericKD.66417496 |
Malwarebytes | Generic.Malware/Suspicious |
VIPRE | Trojan.GenericKD.66417496 |
Sangfor | Trojan.Win32.Remcos.Vglu |
K7AntiVirus | Trojan ( 005a37e21 ) |
Alibaba | Backdoor:Win32/Remcos.857db1d3 |
K7GW | Trojan ( 005a37e21 ) |
CrowdStrike | win/malicious_confidence_100% (W) |
Arcabit | Trojan.Generic.D3F57358 |
Cyren | W32/Injector.BMD.gen!Eldorado |
Symantec | Packed.NSISPacker!g14 |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.ESWF |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | HEUR:Backdoor.Win32.Remcos.gen |
BitDefender | Trojan.GenericKD.66417496 |
Avast | Win32:TrojanX-gen [Trj] |
Tencent | Win32.Trojan.Agen.Tgil |
Emsisoft | Trojan.GenericKD.66417496 (B) |
F-Secure | Trojan.TR/Injector.ppuxh |
DrWeb | Trojan.DownLoader45.54318 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.hc |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Inject |
Webroot | W32.Backdoor.Gen |
Avira | HEUR/AGEN.1337959 |
Antiy-AVL | Trojan/Win32.Injector |
Gridinsoft | Trojan.Win32.Remcos.bot |
Microsoft | Trojan:Win32/Remcos!MTB |
ZoneAlarm | HEUR:Backdoor.Win32.Remcos.gen |
GData | Trojan.GenericKD.66417496 |
Detected | |
AhnLab-V3 | Infostealer/Win.Generic.C5395778 |
McAfee | Artemis!CAEA33E0D520 |
MAX | malware (ai score=84) |
Cylance | unsafe |
TrendMicro-HouseCall | TROJ_GEN.R002H07DE23 |
Rising | Trojan.Injector!8.C4 (TFE:5:VOoMinqZtSK) |
Fortinet | W32/Injector.ESVZ!tr |
AVG | Win32:TrojanX-gen [Trj] |
DeepInstinct | MALICIOUS |