Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | May 17, 2023, 9 a.m. | May 17, 2023, 9:02 a.m. |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.1waif.top/hk38/?YmI=zzkZuzLAoma85XiX7lxIbQG/EJHsOO2+Q6oiR8OLkS/KwAhRwr9lPadDsgBC/R6Ehz+P4CWVVfJwNXurykV5FbLn1BWKF7Aw1kgOiys=&vVMKMC=JtlMqX9aXUH6E | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.memshaconsultancy.com/hk38/?YmI=ylcRdOeQ8XQ4MBe6+o+woVrTwHnafctqX6zKfONVwMcCeye0booFMTvbXdYSGzr1oUKVttZ5cokf78mxnXYdaQyvIAyyJB6YSbiDTd4=&vVMKMC=JtlMqX9aXUH6E | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.lgys174.top/hk38/?YmI=C7+QLmlVH+QiRxI6PBDl5AOYi+WV4kkm2HpNG2cJ9XVlHr0M8Q0IkKn366y7kv3boAdk3F4dVuwUlUtIJQk6NWa3tLVuPdH+n5rm7/w=&vVMKMC=JtlMqX9aXUH6E | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.cryptohere.net/hk38/?YmI=ueolYRFMqDgL2w2WSyY2ND5otMaXj9PSMr4D1l6DUAw2kT04GXN59A0oGKPjQT9+3NvvA9XVQSpCofUlgfc89cVHCNXt6Tw+bOwl+vU=&vVMKMC=JtlMqX9aXUH6E | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ascents.info/hk38/?YmI=KrPc6+l/LbhA4QqNRpcmhen1wfbyqFB9qWau7oi8GuhJrnImuTvqwBhjinANrYUid0CBNXiHItrEvn/DOgRkhYxcfTTricRTxtRtwg8=&vVMKMC=JtlMqX9aXUH6E | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.nescotopp.shop/hk38/?YmI=DrtU8bnbnXpbNShePnwsRj13bS+UCxOuZvzH6bEjmv010pTnm4zit6bh6EVUeYhYrTCAEppr9rHC6Bu3VgZaW+HjzX/PpsxeO8UHktE=&vVMKMC=JtlMqX9aXUH6E |
request | POST http://www.1waif.top/hk38/ |
request | GET http://www.1waif.top/hk38/?YmI=zzkZuzLAoma85XiX7lxIbQG/EJHsOO2+Q6oiR8OLkS/KwAhRwr9lPadDsgBC/R6Ehz+P4CWVVfJwNXurykV5FbLn1BWKF7Aw1kgOiys=&vVMKMC=JtlMqX9aXUH6E |
request | GET http://www.sqlite.org/2020/sqlite-dll-win32-x86-3330000.zip |
request | POST http://www.memshaconsultancy.com/hk38/ |
request | GET http://www.memshaconsultancy.com/hk38/?YmI=ylcRdOeQ8XQ4MBe6+o+woVrTwHnafctqX6zKfONVwMcCeye0booFMTvbXdYSGzr1oUKVttZ5cokf78mxnXYdaQyvIAyyJB6YSbiDTd4=&vVMKMC=JtlMqX9aXUH6E |
request | POST http://www.lgys174.top/hk38/ |
request | GET http://www.lgys174.top/hk38/?YmI=C7+QLmlVH+QiRxI6PBDl5AOYi+WV4kkm2HpNG2cJ9XVlHr0M8Q0IkKn366y7kv3boAdk3F4dVuwUlUtIJQk6NWa3tLVuPdH+n5rm7/w=&vVMKMC=JtlMqX9aXUH6E |
request | POST http://www.cryptohere.net/hk38/ |
request | GET http://www.cryptohere.net/hk38/?YmI=ueolYRFMqDgL2w2WSyY2ND5otMaXj9PSMr4D1l6DUAw2kT04GXN59A0oGKPjQT9+3NvvA9XVQSpCofUlgfc89cVHCNXt6Tw+bOwl+vU=&vVMKMC=JtlMqX9aXUH6E |
request | POST http://www.ascents.info/hk38/ |
request | GET http://www.ascents.info/hk38/?YmI=KrPc6+l/LbhA4QqNRpcmhen1wfbyqFB9qWau7oi8GuhJrnImuTvqwBhjinANrYUid0CBNXiHItrEvn/DOgRkhYxcfTTricRTxtRtwg8=&vVMKMC=JtlMqX9aXUH6E |
request | POST http://www.nescotopp.shop/hk38/ |
request | GET http://www.nescotopp.shop/hk38/?YmI=DrtU8bnbnXpbNShePnwsRj13bS+UCxOuZvzH6bEjmv010pTnm4zit6bh6EVUeYhYrTCAEppr9rHC6Bu3VgZaW+HjzX/PpsxeO8UHktE=&vVMKMC=JtlMqX9aXUH6E |
request | POST http://www.1waif.top/hk38/ |
request | POST http://www.memshaconsultancy.com/hk38/ |
request | POST http://www.lgys174.top/hk38/ |
request | POST http://www.cryptohere.net/hk38/ |
request | POST http://www.ascents.info/hk38/ |
request | POST http://www.nescotopp.shop/hk38/ |
domain | www.1waif.top | description | Generic top level domain TLD | ||||||
domain | www.lgys174.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Local\Temp\nshC0BD.tmp\qgsul.dll |
file | C:\Users\test22\AppData\Local\Temp\nshC0BD.tmp\qgsul.dll |
Bkav | W32.AIDetectMalware |
MicroWorld-eScan | Gen:Variant.Nemesis.22806 |
FireEye | Generic.mg.d35fc5185c8a5873 |
Malwarebytes | Generic.Malware/Suspicious |
VIPRE | Gen:Variant.Nemesis.22806 |
Sangfor | Trojan.Win32.Injector.V7t9 |
Alibaba | Trojan:Win32/Injector.6a7d447b |
K7GW | Trojan ( 005a58ae1 ) |
CrowdStrike | win/malicious_confidence_100% (D) |
Arcabit | Trojan.Nemesis.D5916 [many] |
Cyren | W32/Injector.BNC.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector_AGen.WS |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Gen:Variant.Nemesis.22806 |
Avast | FileRepMalware [Pws] |
Sophos | Mal/Generic-S |
F-Secure | Trojan.TR/AD.GenShell.csjup |
DrWeb | Trojan.Loader.1495 |
TrendMicro | TROJ_GEN.R002C0DEG23 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dc |
Trapmine | malicious.moderate.ml.score |
Emsisoft | Gen:Variant.Nemesis.22806 (B) |
Ikarus | Trojan-Spy.FormBook |
Avira | TR/AD.GenShell.csjup |
MAX | malware (ai score=87) |
Gridinsoft | Trojan.Win32.Downloader.sa |
Microsoft | Trojan:Win32/Formbook.AT!MTB |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Zum.Androm.1 |
Cynet | Malicious (score: 100) |
McAfee | Artemis!D35FC5185C8A |
Cylance | unsafe |
Panda | Trj/Agent.SR |
Rising | Trojan.VecStealer!8.180E7 (TFE:5:0fwdvnBwiGN) |
SentinelOne | Static AI - Suspicious PE |
Fortinet | W32/Injector.ESYG!tr |
AVG | FileRepMalware [Pws] |
Cybereason | malicious.85c8a5 |
DeepInstinct | MALICIOUS |
dead_host | 38.177.159.165:80 |
dead_host | 192.168.56.103:49185 |