Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | June 23, 2023, 4:50 p.m. | June 23, 2023, 4:52 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
vk.com | 87.240.129.133 | |
iplogger.org | 148.251.234.83 | |
ipinfo.io | 34.117.59.81 | |
psv4.userapi.com |
CNAME
ps.userapi.com
|
87.240.190.76 |
api.myip.com | 104.26.9.59 | |
iplis.ru | 148.251.234.93 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49174 104.26.8.59:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 92:b4:ed:98:67:d9:db:8a:1e:bd:0e:fe:7f:22:45:e9:79:b5:78:65 |
TLSv1 192.168.56.102:49181 87.240.137.164:443 |
C=BE, O=GlobalSign nv-sa, CN=GlobalSign Organization Validation CA - SHA256 - G2 | C=RU, ST=Saint Petersburg, L=Saint Petersburg, O=V Kontakte LLC, CN=*.vk.com | 6b:39:d3:5a:fa:5a:ee:80:1a:d7:f6:77:30:52:cf:2b:52:a1:82:09 |
TLSv1 192.168.56.102:49188 87.240.137.164:443 |
C=BE, O=GlobalSign nv-sa, CN=GlobalSign Organization Validation CA - SHA256 - G2 | C=RU, ST=Saint Petersburg, L=Saint Petersburg, O=V Kontakte LLC, CN=*.vk.com | 6b:39:d3:5a:fa:5a:ee:80:1a:d7:f6:77:30:52:cf:2b:52:a1:82:09 |
TLSv1 192.168.56.102:49189 87.240.137.134:443 |
C=BE, O=GlobalSign nv-sa, CN=GlobalSign Organization Validation CA - SHA256 - G2 | C=RU, ST=Saint Petersburg, L=Saint Petersburg, O=V Kontakte LLC, CN=*.userapi.com | bc:a9:84:5f:86:90:b1:02:ba:2d:66:e8:e5:46:c1:57:e9:c0:cc:24 |
suspicious_features | Connection to IP address | suspicious_request | GET http://208.67.104.60/api/tracemap.php | ||||||
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST http://208.67.104.60/api/firegate.php |
request | GET http://208.67.104.60/api/tracemap.php |
request | POST http://208.67.104.60/api/firegate.php |
request | GET https://api.myip.com/ |
request | GET https://vk.com/doc746114504_647280747?hash=cvDFKP5q0CQEjBCbeoeHvPNrWE0xbMxZEmrkIeNKcET&dl=G42DMMJRGQ2TANA:1661413520:uZNj68vRUvQaydRD8wpAK8zluN0I7otw5AHbA1ZlN9T&api=1&no_preview=1 |
request | GET https://vk.com/doc808950829_663208963?hash=7lnLHpejCjd7NAr2eRYJAn51pcxMR9crPOzJfqZV4zP&dl=YZ4Lw1mgCHC7WgzxmLDpK4QEWazFpX5neZjKQp4kuoT&api=1&no_preview=1 |
request | GET https://psv4.userapi.com/c909328/u808950829/docs/d32/ddd157d16075/miz.bmp?extra=AobtdlaolqZ26rkiW0hvXrm5q5YVxQ_Eh1DhlbE_gvwPS8pI7fhNbdUAijRTOH8Y1rYZ0RDNqjreYYzbJCMZvt-TD7tTRpkmsPW21xEYjbVTSYMnotEMrv0KkU4QZDpW1mqINC26LzAXukrcCw&dl=1 |
request | POST http://208.67.104.60/api/firegate.php |
domain | ipinfo.io |
file | C:\Users\test22\AppData\Local\Temp\7zEC88FD6D1\File.exe |
FireEye | Trojan.GenericKD.67698179 |
Arcabit | Trojan.Generic.D408FE03 |
BitDefender | Trojan.GenericKD.67698179 |
MicroWorld-eScan | Trojan.GenericKD.67698179 |
McAfee-GW-Edition | Artemis |
Emsisoft | Trojan.GenericKD.67698179 (B) |
MAX | malware (ai score=88) |
GData | Trojan.GenericKD.67698179 |
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Run a KeyLogger | rule | KeyLogger |
host | 208.67.104.60 |