Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | May 16, 2023, 3:35 p.m. | May 16, 2023, 3:37 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
ALYac | Exploit.CHM-Downloader.Gen |
Sangfor | Exploit.Generic-Script.Save.b67efc64 |
Symantec | Trojan.Malscript |
ESET-NOD32 | HTML/TrojanDropper.Agent.R |
Kaspersky | HEUR:Trojan.Script.Generic |
BitDefender | Exploit.CHM-Downloader.Gen |
MicroWorld-eScan | Exploit.CHM-Downloader.Gen |
Emsisoft | Exploit.CHM-Downloader.Gen (B) |
VIPRE | Exploit.CHM-Downloader.Gen |
TrendMicro | HEUR_CHM.E |
FireEye | Exploit.CHM-Downloader.Gen |
GData | Exploit.CHM-Downloader.Gen |
Arcabit | Exploit.CHM-Downloader.Gen |
ZoneAlarm | HEUR:Trojan.Script.Generic |
MAX | malware (ai score=88) |
Rising | Trojan.MouseJack/HTML!1.BE26 (CLASSIC) |
Fortinet | JS/Agent.00E5!tr |