Summary | ZeroBOX

Claim_E712.wsf

Category Machine Started Completed
FILE s1_win7_x6403_us April 26, 2023, 9:13 a.m. April 26, 2023, 9:15 a.m.
Size 98.0KB
Type UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
MD5 605f0e8f6e2835c4e40b142f2aee3d27
SHA256 12bdd4b5ee0ed1156b2c20d07311edb51460f3f89988c3f34dc68ca7748e4301
CRC32 AEAA7775
ssdeep 3072:v/1ZOI+sttV/y7hKekSMNi1DgEBTBJw3SwP:F1LttV/y7hKJM10EnJwCwP
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
185.39.18.107 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

host 185.39.18.107
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: http://185.39.18.107/ah5tW8LiTPvoXJ.dat
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 4194304
http_method: GET
referer:
path: /ah5tW8LiTPvoXJ.dat
1 13369356 0
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: http://185.39.18.107/ah5tW8LiTPvoXJ.dat
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 4194304
http_method: GET
referer:
path: /ah5tW8LiTPvoXJ.dat
1 13369356 0

send

buffer: !
socket: 860
sent: 1
1 1 0
dead_host 185.39.18.107:80