Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 27, 2023, 7:30 a.m. | June 27, 2023, 7:35 a.m. |
-
svchost.exe "C:\Users\test22\AppData\Local\Temp\svchost.exe"
2552
Name | Response | Post-Analysis Lookup |
---|---|---|
t.me | 149.154.167.99 | |
steamcommunity.com | 104.76.78.101 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49166 23.210.138.32:443 |
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA | unknown=US, unknown=Washington, unknown=Private Organization, serialNumber=602 290 773, C=US, ST=Washington, L=Bellevue, O=Valve Corp, CN=store.steampowered.com | b1:30:5e:4c:ee:14:70:87:a7:d7:1c:77:07:b5:3c:2c:99:13:aa:c5 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
suspicious_features | Connection to IP address | suspicious_request | GET http://5.75.142.250/958f564fa564ae293605c0c6d8cb4c20 |
request | GET http://5.75.142.250/958f564fa564ae293605c0c6d8cb4c20 |
request | GET https://steamcommunity.com/profiles/76561199235044780 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\ProgramData\vcruntime140.dll |
file | C:\ProgramData\msvcp140.dll |
file | C:\ProgramData\nss3.dll |
file | C:\ProgramData\freebl3.dll |
file | C:\ProgramData\mozglue.dll |
file | C:\ProgramData\softokn3.dll |
section | {u'size_of_data': u'0x00291600', u'virtual_address': u'0x0004f000', u'entropy': 7.998651357179907, u'name': u'.data', u'virtual_size': u'0x002a4d84'} | entropy | 7.99865135718 | description | A section with a high entropy has been found | |||||||||
entropy | 0.886846543002 | description | Overall entropy of this PE file is high |
host | 5.75.142.250 |
process | svchost.exe | useragent | Mozilla/5.0 (Windows NT 10.0; x64 rv:107.0) Gecko / 20100101 Firefox / 107.0 | ||||||
process | svchost.exe | useragent | Mozilla/5.0 (Linux; Android 7.0; Pixel C Build/NRD91D; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/53.0.2785.124 Safari/537.36 |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Stealer.12!c |
MicroWorld-eScan | Gen:Trojan.Heur.JP.5sW@aGmZVmk |
FireEye | Generic.mg.1fb72647665a1635 |
ALYac | Gen:Trojan.Heur.JP.5sW@aGmZVmk |
Malwarebytes | Malware.AI.3362036860 |
Sangfor | Trojan.Win32.Save.a |
Alibaba | TrojanPSW:Win32/Stealer.d559462e |
Cybereason | malicious.7665a1 |
Arcabit | Trojan.Heur.JP.ED184C6 |
BitDefenderTheta | AI:Packer.BA0977B91E |
Cyren | W32/Agent.GHQ.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
Elastic | Windows.Trojan.Vidar |
ESET-NOD32 | a variant of Win32/PSW.Agent.ONW |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | Trojan-PSW.Win32.Stealer.bopm |
BitDefender | Gen:Trojan.Heur.JP.5sW@aGmZVmk |
Avast | Win32:PWSX-gen [Trj] |
Tencent | Win32.Trojan-QQPass.QQRob.Wylw |
Emsisoft | Gen:Trojan.Heur.JP.5sW@aGmZVmk (B) |
F-Secure | Trojan.TR/ATRAPS.Gen4 |
VIPRE | Gen:Trojan.Heur.JP.5sW@aGmZVmk |
TrendMicro | TrojanSpy.Win32.VIDAR.YXDFWZ |
McAfee-GW-Edition | BehavesLike.Win32.Generic.vc |
Trapmine | malicious.high.ml.score |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
Avira | TR/ATRAPS.Gen4 |
Antiy-AVL | Trojan[PSW]/Win32.Stealer |
Microsoft | Trojan:Win32/Vidar.JNB!MTB |
ZoneAlarm | Trojan-PSW.Win32.Stealer.bopm |
GData | Win32.Trojan-Stealer.Arkei.H4AWWK |
Detected | |
AhnLab-V3 | Trojan/Win.Vidar.R588668 |
McAfee | Artemis!1FB72647665A |
MAX | malware (ai score=83) |
VBA32 | BScope.TrojanPSW.Stealer |
Cylance | unsafe |
Panda | Trj/Genetic.gen |
TrendMicro-HouseCall | TrojanSpy.Win32.VIDAR.YXDFWZ |
Rising | Stealer.Agent!8.C2 (TFE:5:AvQdEuhLBi) |
Ikarus | Trojan-PSW.Agent |
Fortinet | W32/Agent.ONW!tr.pws |
AVG | Win32:PWSX-gen [Trj] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |