Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | May 24, 2023, 6:40 p.m. | May 24, 2023, 6:43 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
db-ip.com | 172.67.75.166 | |
api.db-ip.com | 104.26.5.15 | |
www.maxmind.com | 104.17.214.67 | |
ipinfo.io | 34.117.59.81 |
IP Address | Status | Action |
---|---|---|
104.17.214.67 | Active | Moloch |
104.17.215.67 | Active | Moloch |
104.26.4.15 | Active | Moloch |
104.26.5.15 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.67.75.166 | Active | Moloch |
208.67.104.60 | Active | Moloch |
34.117.59.81 | Active | Moloch |
85.208.136.10 | Active | Moloch |
94.142.138.113 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49185 172.67.75.166:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 03:f8:79:dd:26:16:32:12:a4:33:99:34:af:f7:33:32:d5:e0:aa:e5 |
TLSv1 192.168.56.102:49184 104.26.5.15:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 03:f8:79:dd:26:16:32:12:a4:33:99:34:af:f7:33:32:d5:e0:aa:e5 |
TLSv1 192.168.56.102:49199 104.26.5.15:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 03:f8:79:dd:26:16:32:12:a4:33:99:34:af:f7:33:32:d5:e0:aa:e5 |
TLSv1 192.168.56.102:49200 104.26.4.15:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 03:f8:79:dd:26:16:32:12:a4:33:99:34:af:f7:33:32:d5:e0:aa:e5 |
suspicious_features | Connection to IP address | suspicious_request | GET http://208.67.104.60/api/tracemap.php | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://85.208.136.10/api/tracemap.php |
request | GET http://208.67.104.60/api/tracemap.php |
request | GET http://www.maxmind.com/geoip/v2.1/city/me |
request | GET http://85.208.136.10/api/tracemap.php |
request | GET https://db-ip.com/ |
request | POST https://api.db-ip.com/v2/p31e4d59ee6ad1a0b5cc80695a873e43a8fbca06/self |
request | POST https://api.db-ip.com/v2/p31e4d59ee6ad1a0b5cc80695a873e43a8fbca06/self |
domain | ipinfo.io |
F-Secure | Trojan:W32/GenInflated.B |
Tencent | Win32.Trojan.Agent.Psmw |
MAX | malware (ai score=63) |
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Run a KeyLogger | rule | KeyLogger |
host | 208.67.104.60 | |||
host | 85.208.136.10 | |||
host | 94.142.138.113 |