Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | May 25, 2023, 10:18 a.m. | May 25, 2023, 10:21 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
elfinindia.com | 162.241.85.104 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49169 -> 162.241.85.104:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49170 -> 162.241.85.104:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 162.241.85.104:443 -> 192.168.56.102:49172 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
FireEye | Heur.BZC.YAX.Nioc.1.063B846E |
CAT-QuickHeal | LNK.APT.43736 |
Arcabit | Heur.BZC.YAX.Nioc.1.063B846E |
BitDefender | Heur.BZC.YAX.Nioc.1.063B846E |
Emsisoft | Heur.BZC.YAX.Nioc.1.063B846E (B) |
VIPRE | Heur.BZC.YAX.Nioc.1.063B846E |
GData | Heur.BZC.YAX.Nioc.1.063B846E |
MAX | malware (ai score=88) |
Zoner | Probably Heur.LNKScript |
Rising | Downloader.Mshta/LNK!1.BADA (CLASSIC) |
Fortinet | LNK/Agent.AHY!tr.dldr |