Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 20, 2023, 7:37 a.m. | June 20, 2023, 7:42 a.m. |
-
-
unsecapp.exe "C:\Users\test22\AppData\Local\Temp\unsecapp.exe"
2148
-
IP Address | Status | Action |
---|---|---|
104.21.44.192 | Active | Moloch |
154.39.174.239 | Active | Moloch |
162.0.231.6 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.67.153.64 | Active | Moloch |
195.161.62.100 | Active | Moloch |
198.49.23.145 | Active | Moloch |
20.255.200.185 | Active | Moloch |
45.33.6.223 | Active | Moloch |
91.195.240.123 | Active | Moloch |
84.54.50.66 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ketocanadmqy.cloud/ogeb/?zS=JCW7LwLHnn7ptjGjE5oXohZmdFlQQ26ARwAmaoNxO6ijvQN7ubUT60jiWusc3p3YeBdlnORuW+NtBTBOf6MBl7CRUR/NRW0MRl+FZL4=&lQHIIB=UDOd2iazjyW | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.gnhxxiazai03.com/ogeb/?zS=wBih4ktWfPNsySsqn3uI1HmQOkxE78XnlLTDvxJFz8Ksfyo9cnxjh72KIWiVUUXAXHwdyJ5YpLQGYf4Z+A02Vjn9hAcAu81BvwPbwlI=&lQHIIB=UDOd2iazjyW | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.r1146.xyz/ogeb/?zS=hQC9FzST15eBXJ4J4T0DlrZN3V4nndOGJI8rCOq0KQaVihaPabvY2aUaE4N/PK/Cku54qUwIUhcWHwQfhhinhH5BJGjDnxoo3iDp4OU=&lQHIIB=UDOd2iazjyW | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.drstephaniebest.com/ogeb/?zS=+v0OuBHGG6cw5ZwrQCjmtsYbU4xaGL5HoMfXaXw9oSi2F/e6KL+7wkfrHW9mkq7nBIGbSiwCyL8lMMQd9mW+kFWaqBx5WK5Isw5ml80=&lQHIIB=UDOd2iazjyW | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.nicejunq.com/ogeb/?zS=61GncP3LZGSS1NuGOhw0w9YAjVqrgaXoImnMpoqiHfpClz+VkHF1OaSSbCiQjyR+WlMAeIDV0LjpJ/XsdXKhboCqPvNVkna3o/MBoBk=&lQHIIB=UDOd2iazjyW | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fb99vn.com/ogeb/?zS=OXN+k+OlhXjl96bKh2NTgPCFs15ire34/TTevHac9SK8WXddN+80UbpDpODSd5z2qlIY7v82+nyluTO39li1mIxMKX8Jb/R8tbta/VI=&lQHIIB=UDOd2iazjyW | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.poshkits.info/ogeb/?zS=AqRXXMRheGbbuzNJ7gUd3ELHirevyxJNjMj6aH1i+QGnsBV8j36ZsXkdOVofclXLXJuwnJ0etyY1DKNGveWcGaTGb3YRrubSnMygGeg=&lQHIIB=UDOd2iazjyW |
request | POST http://www.ketocanadmqy.cloud/ogeb/ |
request | GET http://www.ketocanadmqy.cloud/ogeb/?zS=JCW7LwLHnn7ptjGjE5oXohZmdFlQQ26ARwAmaoNxO6ijvQN7ubUT60jiWusc3p3YeBdlnORuW+NtBTBOf6MBl7CRUR/NRW0MRl+FZL4=&lQHIIB=UDOd2iazjyW |
request | GET http://www.sqlite.org/2017/sqlite-dll-win32-x86-3190000.zip |
request | POST http://www.gnhxxiazai03.com/ogeb/ |
request | GET http://www.gnhxxiazai03.com/ogeb/?zS=wBih4ktWfPNsySsqn3uI1HmQOkxE78XnlLTDvxJFz8Ksfyo9cnxjh72KIWiVUUXAXHwdyJ5YpLQGYf4Z+A02Vjn9hAcAu81BvwPbwlI=&lQHIIB=UDOd2iazjyW |
request | POST http://www.r1146.xyz/ogeb/ |
request | GET http://www.r1146.xyz/ogeb/?zS=hQC9FzST15eBXJ4J4T0DlrZN3V4nndOGJI8rCOq0KQaVihaPabvY2aUaE4N/PK/Cku54qUwIUhcWHwQfhhinhH5BJGjDnxoo3iDp4OU=&lQHIIB=UDOd2iazjyW |
request | POST http://www.drstephaniebest.com/ogeb/ |
request | GET http://www.drstephaniebest.com/ogeb/?zS=+v0OuBHGG6cw5ZwrQCjmtsYbU4xaGL5HoMfXaXw9oSi2F/e6KL+7wkfrHW9mkq7nBIGbSiwCyL8lMMQd9mW+kFWaqBx5WK5Isw5ml80=&lQHIIB=UDOd2iazjyW |
request | POST http://www.nicejunq.com/ogeb/ |
request | GET http://www.nicejunq.com/ogeb/?zS=61GncP3LZGSS1NuGOhw0w9YAjVqrgaXoImnMpoqiHfpClz+VkHF1OaSSbCiQjyR+WlMAeIDV0LjpJ/XsdXKhboCqPvNVkna3o/MBoBk=&lQHIIB=UDOd2iazjyW |
request | POST http://www.fb99vn.com/ogeb/ |
request | GET http://www.fb99vn.com/ogeb/?zS=OXN+k+OlhXjl96bKh2NTgPCFs15ire34/TTevHac9SK8WXddN+80UbpDpODSd5z2qlIY7v82+nyluTO39li1mIxMKX8Jb/R8tbta/VI=&lQHIIB=UDOd2iazjyW |
request | POST http://www.poshkits.info/ogeb/ |
request | GET http://www.poshkits.info/ogeb/?zS=AqRXXMRheGbbuzNJ7gUd3ELHirevyxJNjMj6aH1i+QGnsBV8j36ZsXkdOVofclXLXJuwnJ0etyY1DKNGveWcGaTGb3YRrubSnMygGeg=&lQHIIB=UDOd2iazjyW |
request | POST http://www.fstrainingllc.com/ogeb/ |
request | POST http://www.ketocanadmqy.cloud/ogeb/ |
request | POST http://www.gnhxxiazai03.com/ogeb/ |
request | POST http://www.r1146.xyz/ogeb/ |
request | POST http://www.drstephaniebest.com/ogeb/ |
request | POST http://www.nicejunq.com/ogeb/ |
request | POST http://www.fb99vn.com/ogeb/ |
request | POST http://www.poshkits.info/ogeb/ |
request | POST http://www.fstrainingllc.com/ogeb/ |
domain | www.pymhn.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Local\Temp\nssBFE2.tmp\yxqaybnsjj.dll |
file | C:\Users\test22\AppData\Roaming\yenjsoxhcluqav\foktdy.exe |
file | C:\Users\test22\AppData\Local\Temp\nssBFE2.tmp\yxqaybnsjj.dll |
file | C:\Users\test22\AppData\Roaming\yenjsoxhcluqav\foktdy.exe |
host | 84.54.50.66 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\ienwscl | reg_value | C:\Users\test22\AppData\Roaming\yenjsoxhcluqav\foktdy.exe "C:\Users\test22\AppData\Local\Temp\unsecapp.exe" |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agent.tshg |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Nemesis.22803 |
McAfee | Artemis!D295211B783D |
Malwarebytes | Generic.Malware/Suspicious |
Sangfor | Suspicious.Win32.Save.ins |
Cybereason | malicious.b783d0 |
Arcabit | Trojan.Nemesis.D5913 [many] |
Cyren | W32/Injector.BOF.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ETBA |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | UDS:Trojan-Spy.Win32.Noon.gen |
BitDefender | Gen:Variant.Nemesis.22803 |
Avast | FileRepMalware [Pws] |
Emsisoft | Gen:Variant.Nemesis.22803 (B) |
VIPRE | Gen:Variant.Nemesis.22803 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dc |
Trapmine | malicious.moderate.ml.score |
FireEye | Generic.mg.d295211b783d0ef3 |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
Webroot | W32.Malware.Gen |
Microsoft | Trojan:Win32/Formbook.AT!MTB |
ZoneAlarm | UDS:Trojan-Spy.Win32.Noon.gen |
GData | Zum.Androm.1 |
Detected | |
MAX | malware (ai score=88) |
Cylance | unsafe |
Rising | Trojan.Avemariarat!8.11CB9 (TFE:6:M0iIpRjbqhI) |
Ikarus | Trojan.NSIS.Agent |
Fortinet | NSIS/Agent.DCAC!tr |
AVG | FileRepMalware [Pws] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (D) |