Summary | ZeroBOX

ProjectFunding_B496.wsf

Category Machine Started Completed
FILE s1_win7_x6402 April 28, 2023, 9:41 a.m. April 28, 2023, 9:43 a.m.
Size 42.8KB
Type UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
MD5 de0e6380f06d01c12e312b58221c1fcd
SHA256 1fbca45b85697a0e46cc73caefd77291b1f0c8f5ca25dd0d18330c0bf6b5ec7e
CRC32 25CE84F7
ssdeep 768:r04vjQj2kWoQ1b/9SeIVwJF/uiSxp7gZxI6xI3hKxviF:1sj/tQl/9SeIGH0p0Bxve
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
193.243.147.185 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Kaspersky HEUR:Trojan.Script.Generic
ZoneAlarm HEUR:Trojan.Script.Generic
host 193.243.147.185
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: http://193.243.147.185/a8SBzlM9yOU.dat
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 4194304
http_method: GET
referer:
path: /a8SBzlM9yOU.dat
1 13369356 0
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: http://193.243.147.185/a8SBzlM9yOU.dat
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 4194304
http_method: GET
referer:
path: /a8SBzlM9yOU.dat
1 13369356 0

send

buffer: !
socket: 864
sent: 1
1 1 0
dead_host 193.243.147.185:80