Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 21, 2023, 4:01 p.m. | June 21, 2023, 4:04 p.m. |
-
-
unsecapp.exe "C:\Users\test22\AppData\Local\Temp\unsecapp.exe"
2064
-
IP Address | Status | Action |
---|---|---|
104.21.12.203 | Active | Moloch |
154.39.174.239 | Active | Moloch |
162.0.231.6 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.67.203.63 | Active | Moloch |
195.161.62.100 | Active | Moloch |
198.185.159.145 | Active | Moloch |
20.255.200.185 | Active | Moloch |
45.33.6.223 | Active | Moloch |
91.195.240.123 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ketocanadmqy.cloud/ogeb/?jn=JCW7LwLHnn7ptjGjE5oXohZmdFlQQ26ARwAmaoNxO6ijvQN7ubUT60jiWusc3p3YeBdlnORuW+NtBTBOf6MBl7CRUR/NRW0MRl+FZL4=&q2hFh=SZfKrZcS | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.gnhxxiazai03.com/ogeb/?jn=wBih4ktWfPNsySsqn3uI1HmQOkxE78XnlLTDvxJFz8Ksfyo9cnxjh72KIWiVUUXAXHwdyJ5YpLQGYf4Z+A02Vjn9hAcAu81BvwPbwlI=&q2hFh=SZfKrZcS | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.r1146.xyz/ogeb/?jn=hQC9FzST15eBXJ4J4T0DlrZN3V4nndOGJI8rCOq0KQaVihaPabvY2aUaE4N/PK/Cku54qUwIUhcWHwQfhhinhH5BJGjDnxoo3iDp4OU=&q2hFh=SZfKrZcS | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.drstephaniebest.com/ogeb/?jn=+v0OuBHGG6cw5ZwrQCjmtsYbU4xaGL5HoMfXaXw9oSi2F/e6KL+7wkfrHW9mkq7nBIGbSiwCyL8lMMQd9mW+kFWaqBx5WK5Isw5ml80=&q2hFh=SZfKrZcS | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.nicejunq.com/ogeb/?jn=61GncP3LZGSS1NuGOhw0w9YAjVqrgaXoImnMpoqiHfpClz+VkHF1OaSSbCiQjyR+WlMAeIDV0LjpJ/XsdXKhboCqPvNVkna3o/MBoBk=&q2hFh=SZfKrZcS | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fb99vn.com/ogeb/?jn=OXN+k+OlhXjl96bKh2NTgPCFs15ire34/TTevHac9SK8WXddN+80UbpDpODSd5z2qlIY7v82+nyluTO39li1mIxMKX8Jb/R8tbta/VI=&q2hFh=SZfKrZcS | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.poshkits.info/ogeb/?jn=AqRXXMRheGbbuzNJ7gUd3ELHirevyxJNjMj6aH1i+QGnsBV8j36ZsXkdOVofclXLXJuwnJ0etyY1DKNGveWcGaTGb3YRrubSnMygGeg=&q2hFh=SZfKrZcS | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.fstrainingllc.com/ogeb/?jn=3AILmDJPkAUUrpOG/VIeUrZXgpOSZo6R/tiWoTcNtPioWsJTZGZ4drzV2BWU9NJm5Ofj96iGCfDOoWGqNQZdTpxyILTH4aD/oQaBOA8=&q2hFh=SZfKrZcS |
request | POST http://www.ketocanadmqy.cloud/ogeb/ |
request | GET http://www.ketocanadmqy.cloud/ogeb/?jn=JCW7LwLHnn7ptjGjE5oXohZmdFlQQ26ARwAmaoNxO6ijvQN7ubUT60jiWusc3p3YeBdlnORuW+NtBTBOf6MBl7CRUR/NRW0MRl+FZL4=&q2hFh=SZfKrZcS |
request | GET http://www.sqlite.org/2018/sqlite-dll-win32-x86-3220000.zip |
request | POST http://www.gnhxxiazai03.com/ogeb/ |
request | GET http://www.gnhxxiazai03.com/ogeb/?jn=wBih4ktWfPNsySsqn3uI1HmQOkxE78XnlLTDvxJFz8Ksfyo9cnxjh72KIWiVUUXAXHwdyJ5YpLQGYf4Z+A02Vjn9hAcAu81BvwPbwlI=&q2hFh=SZfKrZcS |
request | POST http://www.r1146.xyz/ogeb/ |
request | GET http://www.r1146.xyz/ogeb/?jn=hQC9FzST15eBXJ4J4T0DlrZN3V4nndOGJI8rCOq0KQaVihaPabvY2aUaE4N/PK/Cku54qUwIUhcWHwQfhhinhH5BJGjDnxoo3iDp4OU=&q2hFh=SZfKrZcS |
request | POST http://www.drstephaniebest.com/ogeb/ |
request | GET http://www.drstephaniebest.com/ogeb/?jn=+v0OuBHGG6cw5ZwrQCjmtsYbU4xaGL5HoMfXaXw9oSi2F/e6KL+7wkfrHW9mkq7nBIGbSiwCyL8lMMQd9mW+kFWaqBx5WK5Isw5ml80=&q2hFh=SZfKrZcS |
request | POST http://www.nicejunq.com/ogeb/ |
request | GET http://www.nicejunq.com/ogeb/?jn=61GncP3LZGSS1NuGOhw0w9YAjVqrgaXoImnMpoqiHfpClz+VkHF1OaSSbCiQjyR+WlMAeIDV0LjpJ/XsdXKhboCqPvNVkna3o/MBoBk=&q2hFh=SZfKrZcS |
request | POST http://www.fb99vn.com/ogeb/ |
request | GET http://www.fb99vn.com/ogeb/?jn=OXN+k+OlhXjl96bKh2NTgPCFs15ire34/TTevHac9SK8WXddN+80UbpDpODSd5z2qlIY7v82+nyluTO39li1mIxMKX8Jb/R8tbta/VI=&q2hFh=SZfKrZcS |
request | POST http://www.poshkits.info/ogeb/ |
request | GET http://www.poshkits.info/ogeb/?jn=AqRXXMRheGbbuzNJ7gUd3ELHirevyxJNjMj6aH1i+QGnsBV8j36ZsXkdOVofclXLXJuwnJ0etyY1DKNGveWcGaTGb3YRrubSnMygGeg=&q2hFh=SZfKrZcS |
request | POST http://www.fstrainingllc.com/ogeb/ |
request | GET http://www.fstrainingllc.com/ogeb/?jn=3AILmDJPkAUUrpOG/VIeUrZXgpOSZo6R/tiWoTcNtPioWsJTZGZ4drzV2BWU9NJm5Ofj96iGCfDOoWGqNQZdTpxyILTH4aD/oQaBOA8=&q2hFh=SZfKrZcS |
request | POST http://www.ketocanadmqy.cloud/ogeb/ |
request | POST http://www.gnhxxiazai03.com/ogeb/ |
request | POST http://www.r1146.xyz/ogeb/ |
request | POST http://www.drstephaniebest.com/ogeb/ |
request | POST http://www.nicejunq.com/ogeb/ |
request | POST http://www.fb99vn.com/ogeb/ |
request | POST http://www.poshkits.info/ogeb/ |
request | POST http://www.fstrainingllc.com/ogeb/ |
file | C:\Users\test22\AppData\Local\Temp\nsjC011.tmp\apeuke.dll |
file | C:\Users\test22\AppData\Roaming\yenjsoxhcluqav\foktdy.exe |
file | C:\Users\test22\AppData\Local\Temp\nsjC011.tmp\apeuke.dll |
file | C:\Users\test22\AppData\Roaming\yenjsoxhcluqav\foktdy.exe |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\ienwscl | reg_value | C:\Users\test22\AppData\Roaming\yenjsoxhcluqav\foktdy.exe "C:\Users\test22\AppData\Local\Temp\unsecapp.exe" |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Agent.tshg |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Nemesis.22779 |
FireEye | Generic.mg.297c423d2a4a52a7 |
Malwarebytes | Trojan.Injector |
VIPRE | Gen:Variant.Nemesis.22779 |
Sangfor | Suspicious.Win32.Save.ins |
K7GW | Trojan ( 005a76941 ) |
CrowdStrike | win/malicious_confidence_100% (D) |
Arcabit | Trojan.Nemesis.D58FB [many] |
Cyren | W32/Injector.BOF.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Injector.ETBD |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | VHO:Trojan.Win32.Sdum.gen |
BitDefender | Gen:Variant.Nemesis.22779 |
Avast | Win32:PWSX-gen [Trj] |
Emsisoft | Gen:Variant.Nemesis.22779 (B) |
F-Secure | Trojan.TR/AD.Swotter.jwcrh |
DrWeb | Trojan.Loader.1554 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dc |
Trapmine | malicious.moderate.ml.score |
Sophos | Mal/Generic-S |
Ikarus | Trojan-Spy.FormBook |
Avira | TR/AD.Swotter.jwcrh |
Microsoft | Trojan:Win32/Formbook.AT!MTB |
ZoneAlarm | HEUR:Trojan-Spy.Win32.Noon.gen |
GData | Trojan.NSISX.Spy.Gen.24 |
Detected | |
AhnLab-V3 | Trojan/Win.NSISInject.R587856 |
McAfee | Artemis!297C423D2A4A |
MAX | malware (ai score=83) |
Cylance | unsafe |
Panda | Trj/Chgt.AD |
Rising | Trojan.Avemariarat!8.11CB9 (TFE:6:M0iIpRjbqhI) |
SentinelOne | Static AI - Suspicious PE |
Fortinet | NSIS/Agent.DCAC!tr |
BitDefenderTheta | Gen:NN.ZedlaF.36250.fu4@aGbp9yoi |
AVG | Win32:PWSX-gen [Trj] |
DeepInstinct | MALICIOUS |