Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 20, 2023, 5:29 p.m. | June 20, 2023, 5:34 p.m. |
IP Address | Status | Action |
---|---|---|
104.21.36.57 | Active | Moloch |
154.39.174.239 | Active | Moloch |
162.0.231.6 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.67.153.64 | Active | Moloch |
172.67.203.63 | Active | Moloch |
195.161.62.100 | Active | Moloch |
198.49.23.145 | Active | Moloch |
20.255.200.185 | Active | Moloch |
45.33.6.223 | Active | Moloch |
84.32.84.32 | Active | Moloch |
91.195.240.123 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ketocanadmqy.cloud/ogeb/?-HBuafS=JCW7LwLHnn7ptjGjE5oXohZmdFlQQ26ARwAmaoNxO6ijvQN7ubUT60jiWusc3p3YeBdlnORuW+NtBTBOf6MBl7CRUR/NRW0MRl+FZL4=&ghEQ8=pD1STWQcgyabP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.gnhxxiazai03.com/ogeb/?-HBuafS=wBih4ktWfPNsySsqn3uI1HmQOkxE78XnlLTDvxJFz8Ksfyo9cnxjh72KIWiVUUXAXHwdyJ5YpLQGYf4Z+A02Vjn9hAcAu81BvwPbwlI=&ghEQ8=pD1STWQcgyabP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.r1146.xyz/ogeb/?-HBuafS=hQC9FzST15eBXJ4J4T0DlrZN3V4nndOGJI8rCOq0KQaVihaPabvY2aUaE4N/PK/Cku54qUwIUhcWHwQfhhinhH5BJGjDnxoo3iDp4OU=&ghEQ8=pD1STWQcgyabP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.drstephaniebest.com/ogeb/?-HBuafS=+v0OuBHGG6cw5ZwrQCjmtsYbU4xaGL5HoMfXaXw9oSi2F/e6KL+7wkfrHW9mkq7nBIGbSiwCyL8lMMQd9mW+kFWaqBx5WK5Isw5ml80=&ghEQ8=pD1STWQcgyabP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.nicejunq.com/ogeb/?-HBuafS=61GncP3LZGSS1NuGOhw0w9YAjVqrgaXoImnMpoqiHfpClz+VkHF1OaSSbCiQjyR+WlMAeIDV0LjpJ/XsdXKhboCqPvNVkna3o/MBoBk=&ghEQ8=pD1STWQcgyabP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fb99vn.com/ogeb/?-HBuafS=OXN+k+OlhXjl96bKh2NTgPCFs15ire34/TTevHac9SK8WXddN+80UbpDpODSd5z2qlIY7v82+nyluTO39li1mIxMKX8Jb/R8tbta/VI=&ghEQ8=pD1STWQcgyabP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.poshkits.info/ogeb/?-HBuafS=AqRXXMRheGbbuzNJ7gUd3ELHirevyxJNjMj6aH1i+QGnsBV8j36ZsXkdOVofclXLXJuwnJ0etyY1DKNGveWcGaTGb3YRrubSnMygGeg=&ghEQ8=pD1STWQcgyabP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fstrainingllc.com/ogeb/?-HBuafS=3AILmDJPkAUUrpOG/VIeUrZXgpOSZo6R/tiWoTcNtPioWsJTZGZ4drzV2BWU9NJm5Ofj96iGCfDOoWGqNQZdTpxyILTH4aD/oQaBOA8=&ghEQ8=pD1STWQcgyabP | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.visitel.shop/ogeb/?-HBuafS=JmLU2mTBWsrOHDUrIsVZgtVQRaelVRuf6+I2Xs1ZEo8rZrv8bAAW18MTALrdbAN3gfqX7mOUKpSKY+XC5VOAaGGHACr1P6ttQJNqQi0=&ghEQ8=pD1STWQcgyabP |
request | POST http://www.ketocanadmqy.cloud/ogeb/ |
request | GET http://www.ketocanadmqy.cloud/ogeb/?-HBuafS=JCW7LwLHnn7ptjGjE5oXohZmdFlQQ26ARwAmaoNxO6ijvQN7ubUT60jiWusc3p3YeBdlnORuW+NtBTBOf6MBl7CRUR/NRW0MRl+FZL4=&ghEQ8=pD1STWQcgyabP |
request | GET http://www.sqlite.org/2021/sqlite-dll-win32-x86-3360000.zip |
request | POST http://www.gnhxxiazai03.com/ogeb/ |
request | GET http://www.gnhxxiazai03.com/ogeb/?-HBuafS=wBih4ktWfPNsySsqn3uI1HmQOkxE78XnlLTDvxJFz8Ksfyo9cnxjh72KIWiVUUXAXHwdyJ5YpLQGYf4Z+A02Vjn9hAcAu81BvwPbwlI=&ghEQ8=pD1STWQcgyabP |
request | POST http://www.r1146.xyz/ogeb/ |
request | GET http://www.r1146.xyz/ogeb/?-HBuafS=hQC9FzST15eBXJ4J4T0DlrZN3V4nndOGJI8rCOq0KQaVihaPabvY2aUaE4N/PK/Cku54qUwIUhcWHwQfhhinhH5BJGjDnxoo3iDp4OU=&ghEQ8=pD1STWQcgyabP |
request | POST http://www.drstephaniebest.com/ogeb/ |
request | GET http://www.drstephaniebest.com/ogeb/?-HBuafS=+v0OuBHGG6cw5ZwrQCjmtsYbU4xaGL5HoMfXaXw9oSi2F/e6KL+7wkfrHW9mkq7nBIGbSiwCyL8lMMQd9mW+kFWaqBx5WK5Isw5ml80=&ghEQ8=pD1STWQcgyabP |
request | POST http://www.nicejunq.com/ogeb/ |
request | GET http://www.nicejunq.com/ogeb/?-HBuafS=61GncP3LZGSS1NuGOhw0w9YAjVqrgaXoImnMpoqiHfpClz+VkHF1OaSSbCiQjyR+WlMAeIDV0LjpJ/XsdXKhboCqPvNVkna3o/MBoBk=&ghEQ8=pD1STWQcgyabP |
request | POST http://www.fb99vn.com/ogeb/ |
request | GET http://www.fb99vn.com/ogeb/?-HBuafS=OXN+k+OlhXjl96bKh2NTgPCFs15ire34/TTevHac9SK8WXddN+80UbpDpODSd5z2qlIY7v82+nyluTO39li1mIxMKX8Jb/R8tbta/VI=&ghEQ8=pD1STWQcgyabP |
request | POST http://www.poshkits.info/ogeb/ |
request | GET http://www.poshkits.info/ogeb/?-HBuafS=AqRXXMRheGbbuzNJ7gUd3ELHirevyxJNjMj6aH1i+QGnsBV8j36ZsXkdOVofclXLXJuwnJ0etyY1DKNGveWcGaTGb3YRrubSnMygGeg=&ghEQ8=pD1STWQcgyabP |
request | POST http://www.fstrainingllc.com/ogeb/ |
request | GET http://www.fstrainingllc.com/ogeb/?-HBuafS=3AILmDJPkAUUrpOG/VIeUrZXgpOSZo6R/tiWoTcNtPioWsJTZGZ4drzV2BWU9NJm5Ofj96iGCfDOoWGqNQZdTpxyILTH4aD/oQaBOA8=&ghEQ8=pD1STWQcgyabP |
request | POST http://www.visitel.shop/ogeb/ |
request | GET http://www.visitel.shop/ogeb/?-HBuafS=JmLU2mTBWsrOHDUrIsVZgtVQRaelVRuf6+I2Xs1ZEo8rZrv8bAAW18MTALrdbAN3gfqX7mOUKpSKY+XC5VOAaGGHACr1P6ttQJNqQi0=&ghEQ8=pD1STWQcgyabP |
request | POST http://www.cracksoftwaresite.com/ogeb/ |
request | POST http://www.ketocanadmqy.cloud/ogeb/ |
request | POST http://www.gnhxxiazai03.com/ogeb/ |
request | POST http://www.r1146.xyz/ogeb/ |
request | POST http://www.drstephaniebest.com/ogeb/ |
request | POST http://www.nicejunq.com/ogeb/ |
request | POST http://www.fb99vn.com/ogeb/ |
request | POST http://www.poshkits.info/ogeb/ |
request | POST http://www.fstrainingllc.com/ogeb/ |
request | POST http://www.visitel.shop/ogeb/ |
request | POST http://www.cracksoftwaresite.com/ogeb/ |
file | C:\Users\test22\AppData\Local\Temp\nsqF280.tmp\zdbrx.dll |
file | C:\Users\test22\AppData\Local\Temp\nsqF280.tmp\zdbrx.dll |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agent.tshg |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Nemesis.22782 |
FireEye | Generic.mg.af391ee598dcad65 |
Malwarebytes | Trojan.Loader |
VIPRE | Gen:Variant.Nemesis.22782 |
Sangfor | Suspicious.Win32.Save.ins |
CrowdStrike | win/malicious_confidence_100% (D) |
Alibaba | Trojan:Win32/Strab.6537c11b |
K7GW | Trojan ( 005a6c251 ) |
K7AntiVirus | Trojan ( 005a6c251 ) |
Arcabit | Trojan.Nemesis.D58FE [many] |
VirIT | Trojan.Win32.Genus.RHT |
Cyren | W32/S-f7ef6688!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ETAW |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | HEUR:Trojan.Win32.Strab.gen |
BitDefender | Gen:Variant.Nemesis.22782 |
Avast | Win32:InjectorX-gen [Trj] |
Tencent | Win32.Trojan.Strab.Lqil |
Emsisoft | Gen:Variant.Nemesis.22782 (B) |
TrendMicro | TROJ_GEN.R002C0DFK23 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dc |
Trapmine | malicious.moderate.ml.score |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
MAX | malware (ai score=85) |
Microsoft | Trojan:Win32/Wacatac.B!ml |
ZoneAlarm | HEUR:Trojan.Win32.Strab.gen |
GData | Zum.Androm.1 |
Detected | |
AhnLab-V3 | Trojan/Win.AveMariaRAT.R587142 |
Acronis | suspicious |
McAfee | Artemis!AF391EE598DC |
Cylance | unsafe |
Panda | Trj/Genetic.gen |
TrendMicro-HouseCall | TROJ_GEN.R002H0CFK23 |
Rising | Trojan.Injector!8.C4 (TFE:6:I3RwG4Ux51M) |
Ikarus | Trojan.Win32.Injector |
Fortinet | NSIS/Agent.DCAC!tr |
AVG | Win32:InjectorX-gen [Trj] |
DeepInstinct | MALICIOUS |