Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | April 19, 2023, 8:59 a.m. | April 19, 2023, 9:05 a.m. |
-
-
fkfoiuttz.exe "C:\Users\test22\AppData\Local\Temp\fkfoiuttz.exe" C:\Users\test22\AppData\Local\Temp\lnfdr.x
2052-
fkfoiuttz.exe "C:\Users\test22\AppData\Local\Temp\fkfoiuttz.exe"
2108
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
katruda.duckdns.org | 212.8.244.201 | |
geoplugin.net | 178.237.33.50 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2042936 | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain | Potentially Bad Traffic |
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2022918 | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain | Misc activity |
TCP 192.168.56.103:49165 -> 212.8.244.201:1992 | 2036594 | ET JA3 Hash - Remcos 3.x TLS Connection | Malware Command and Control Activity Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.103:49165 212.8.244.201:1992 |
None | None | None |
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://geoplugin.net/json.gp |
domain | katruda.duckdns.org |
request | GET http://geoplugin.net/json.gp |
file | C:\Users\test22\AppData\Local\Temp\fkfoiuttz.exe |
file | C:\Users\test22\AppData\Roaming\mrbwgcluq\ajfo.exe |
file | C:\Users\test22\AppData\Roaming\mrbwgcluq\ajfo.exe |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\ktdyiqmv | reg_value | C:\Users\test22\AppData\Roaming\mrbwgcluq\ajfo.exe "C:\Users\test22\AppData\Local\Temp\fkfoiuttz.exe" C:\Users\test22\AppData\Loc |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.24 |
Cylance | unsafe |
VIPRE | Trojan.NSISX.Spy.Gen.24 |
CrowdStrike | win/malicious_confidence_100% (D) |
Symantec | Packed.NSISPacker!g14 |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.ESWJ |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.NSISX.Spy.Gen.24 |
Avast | FileRepMalware [Trj] |
Emsisoft | Trojan.NSISX.Spy.Gen.24 (B) |
F-Secure | Heuristic.HEUR/AGEN.1337959 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.hc |
FireEye | Generic.mg.08186cde92790a74 |
Ikarus | Trojan.Inject |
GData | Gen:Variant.Fragtor.261666 |
Avira | HEUR/AGEN.1337959 |
Arcabit | Trojan.NSISX.Spy.Gen.24 [many] |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
Microsoft | Trojan:Win32/Wacatac.B!ml |
Detected | |
AhnLab-V3 | Infostealer/Win.Generic.C5395778 |
BitDefenderTheta | Gen:NN.ZexaF.36164.fqW@aifATUei |
ALYac | Trojan.NSISX.Spy.Gen.24 |
MAX | malware (ai score=88) |
VBA32 | BScope.Trojan.Wacatac |
Rising | Trojan.Generic@AI.82 (RDML:/3Im4WAK1PbqvK62hAjzUg) |
Fortinet | W32/Injector.ESWG!tr |
AVG | FileRepMalware [Trj] |
DeepInstinct | MALICIOUS |