Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 20, 2023, 9:34 a.m. | June 20, 2023, 9:36 a.m. |
-
wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\mokkshk.vbs
2568
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
195.178.120.24 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
wmi | SELECT * FROM Win32_OperatingSystem |
host | 195.178.120.24 |
CAT-QuickHeal | VBS.Trojan.45344 |
Sangfor | Malware.Generic-VBS.Save.d9d6afc4 |
Symantec | ISB.Downloader!gen285 |
Avast | JS:Boxter-A [Drp] |
Kaspersky | HEUR:Trojan-Downloader.Script.Generic |
BitDefender | VB:Trojan.Valyria.8281 |
MicroWorld-eScan | VB:Trojan.Valyria.8281 |
Emsisoft | VB:Trojan.Valyria.8281 (B) |
DrWeb | VBS.DownLoader.2418 |
VIPRE | VB:Trojan.Valyria.8281 |
FireEye | VB:Trojan.Valyria.8281 |
MAX | malware (ai score=84) |
Arcabit | VB:Trojan.Valyria.D2059 |
GData | VB:Trojan.Valyria.8281 |
Detected | |
ALYac | VB:Trojan.Valyria.8281 |
Ikarus | Trojan.VBS.Agent |
AVG | JS:Boxter-A [Drp] |
parent_process | wscript.exe | martian_process | C:\Users\Public\mojooooo.exe |
dead_host | 195.178.120.24:80 |
file | C:\Users\Public\mojooooo.exe |