Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 22, 2023, 4:15 p.m. | May 22, 2023, 4:23 p.m. |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.amateurshow.online/hjdr/?sQ51n=xX5SVKkWhoDut3GzBaDmppnEHsg/q+4WKSSlO6xSWbIBYORImKJaBpt9iPBmVz2FT2wLfcB9Y2Q6assiK3BzS8oN8k0Uh6RuPdoxrUM=&O-G=Y-3P | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.howtrue.info/hjdr/?sQ51n=kJhn0XnRZRgnPBFsTC3RrkdNU3jL2gKJb5tjL3sD/5M7+ZJLcewBYYG+QRdPVJXXplIlf5qgAFj8zlCmH3brR5caIrNXSuF9PhWnmJU=&O-G=Y-3P | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.tugrow.top/hjdr/?sQ51n=2Lz3cRNcgovZAvoxkyTJJkVbnS/f0a6Q88r0UIjg2Los90+Pf0cBdPH279Q+Q6Q5Wf8ziDEK77rXCjEWctJre0mQm9v094R3uDXqBk4=&O-G=Y-3P | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.xn--pdotrychler-l8a.ch/hjdr/?sQ51n=viX6L1AgcIzkNKvffNzJJ+Yd0/U+wEe4YYZ25bQBQN6YyRvPjBEvK6hqMFdbfSlnHMzHqKUOr90SHQpYKy1ow0mwR1Rp7LB2XNGkbPc=&O-G=Y-3P | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.moneyflowplant.com/hjdr/?sQ51n=eyJcKPxcHEkYOgBJ9ZZ9cit4y5B++Dvl/uOHalw31nGSIs778X+Kd1FjwZjeX1NbjiHN6FVudnpl9UmJEcwgNYvdeBiOQHW6RccTTCs=&O-G=Y-3P |
request | GET http://www.amateurshow.online/hjdr/?sQ51n=xX5SVKkWhoDut3GzBaDmppnEHsg/q+4WKSSlO6xSWbIBYORImKJaBpt9iPBmVz2FT2wLfcB9Y2Q6assiK3BzS8oN8k0Uh6RuPdoxrUM=&O-G=Y-3P |
request | GET http://www.sqlite.org/2019/sqlite-dll-win32-x86-3290000.zip |
request | POST http://www.zservers.xyz/hjdr/ |
request | POST http://www.howtrue.info/hjdr/ |
request | GET http://www.howtrue.info/hjdr/?sQ51n=kJhn0XnRZRgnPBFsTC3RrkdNU3jL2gKJb5tjL3sD/5M7+ZJLcewBYYG+QRdPVJXXplIlf5qgAFj8zlCmH3brR5caIrNXSuF9PhWnmJU=&O-G=Y-3P |
request | POST http://www.tugrow.top/hjdr/ |
request | GET http://www.tugrow.top/hjdr/?sQ51n=2Lz3cRNcgovZAvoxkyTJJkVbnS/f0a6Q88r0UIjg2Los90+Pf0cBdPH279Q+Q6Q5Wf8ziDEK77rXCjEWctJre0mQm9v094R3uDXqBk4=&O-G=Y-3P |
request | POST http://www.xn--pdotrychler-l8a.ch/hjdr/ |
request | GET http://www.xn--pdotrychler-l8a.ch/hjdr/?sQ51n=viX6L1AgcIzkNKvffNzJJ+Yd0/U+wEe4YYZ25bQBQN6YyRvPjBEvK6hqMFdbfSlnHMzHqKUOr90SHQpYKy1ow0mwR1Rp7LB2XNGkbPc=&O-G=Y-3P |
request | POST http://www.moneyflowplant.com/hjdr/ |
request | GET http://www.moneyflowplant.com/hjdr/?sQ51n=eyJcKPxcHEkYOgBJ9ZZ9cit4y5B++Dvl/uOHalw31nGSIs778X+Kd1FjwZjeX1NbjiHN6FVudnpl9UmJEcwgNYvdeBiOQHW6RccTTCs=&O-G=Y-3P |
request | POST http://www.zservers.xyz/hjdr/ |
request | POST http://www.howtrue.info/hjdr/ |
request | POST http://www.tugrow.top/hjdr/ |
request | POST http://www.xn--pdotrychler-l8a.ch/hjdr/ |
request | POST http://www.moneyflowplant.com/hjdr/ |
domain | www.tugrow.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Local\Temp\nseEF92.tmp\ekzjofb.dll |
file | C:\Users\test22\AppData\Local\Temp\nseEF92.tmp\ekzjofb.dll |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agent.tshg |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.Generic.33731746 |
FireEye | Generic.mg.f4fb22b77def98b9 |
ALYac | Trojan.Generic.33731746 |
Malwarebytes | Trojan.Loader |
VIPRE | Trojan.Generic.33731746 |
Sangfor | Trojan.Win32.Injector.Vmgn |
K7AntiVirus | Trojan ( 005a581e1 ) |
Alibaba | Trojan:Win32/Loader.19fc47f9 |
K7GW | Trojan ( 005a581e1 ) |
CrowdStrike | win/malicious_confidence_100% (W) |
Arcabit | Trojan.Generic.D202B4A2 |
VirIT | Trojan.Win32.Genus.QIX |
Cyren | W32/Injector.ALX.gen!Eldorado |
Symantec | Trojan Horse |
ESET-NOD32 | a variant of Win32/Injector.ESYF |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | UDS:Trojan.Win32.Loader.gen |
BitDefender | Trojan.Generic.33731746 |
Avast | Win32:InjectorX-gen [Trj] |
Tencent | Win32.Trojan.Loader.Psmw |
Sophos | Mal/Generic-R |
F-Secure | Trojan.TR/Injector.bzxyo |
DrWeb | Trojan.Loader.1487 |
TrendMicro | TROJ_GEN.R002C0DEE23 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dc |
Trapmine | malicious.moderate.ml.score |
Emsisoft | Trojan.Generic.33731746 (B) |
Ikarus | Trojan-Spy.FormBook |
Webroot | W32.Trojan.Gen |
Avira | TR/Injector.bzxyo |
Gridinsoft | Ransom.Win32.Sabsik.sa |
Xcitium | Malware@#13p6krnix3v6x |
Microsoft | Trojan:Win32/Formbook!MTB |
ZoneAlarm | UDS:Trojan.Win32.Loader.gen |
GData | Trojan.Generic.33731746 |
Detected | |
AhnLab-V3 | Trojan/Win.VecStealer.R577387 |
McAfee | RDN/Generic.dx |
MAX | malware (ai score=80) |
VBA32 | Trojan.Loader |
Cylance | unsafe |
Panda | Trj/GdSda.A |
TrendMicro-HouseCall | TROJ_GEN.R03BH0CED23 |
Rising | Trojan.VecStealer!8.180E7 (TFE:5:NWaMQ5f9J5U) |
SentinelOne | Static AI - Suspicious PE |
Fortinet | W32/Injector.WK!tr |