Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 12, 2023, 7:33 a.m. | July 12, 2023, 7:40 a.m. |
-
YoDo_Fake.exe "C:\Users\test22\AppData\Local\Temp\YoDo_Fake.exe"
2568
Name | Response | Post-Analysis Lookup |
---|---|---|
cdn.discordapp.com | 162.159.135.233 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49161 -> 162.159.134.233:443 | 2035464 | ET INFO Observed Discord Domain (discordapp .com in TLS SNI) | Misc activity |
TCP 192.168.56.101:49161 -> 162.159.134.233:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49161 -> 162.159.134.233:443 | 2035464 | ET INFO Observed Discord Domain (discordapp .com in TLS SNI) | Misc activity |
TCP 192.168.56.101:49161 -> 162.159.134.233:443 | 2035464 | ET INFO Observed Discord Domain (discordapp .com in TLS SNI) | Misc activity |
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2035466 | ET INFO Observed Discord Domain in DNS Lookup (discordapp .com) | Misc activity |
TCP 192.168.56.101:49161 -> 162.159.134.233:443 | 2035464 | ET INFO Observed Discord Domain (discordapp .com in TLS SNI) | Misc activity |
Suricata TLS
No Suricata TLS
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Coins.4!c |
Elastic | malicious (high confidence) |
McAfee | Artemis!10ADFD55D2FE |
Sangfor | Trojan.Win32.Save.a |
Symantec | ML.Attribute.HighConfidence |
tehtris | Generic.Malware |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Agent.HAS |
APEX | Malicious |
Kaspersky | HEUR:Trojan-PSW.Win32.Coins.gen |
Avast | Win32:PWSX-gen [Trj] |
TrendMicro | Trojan.Win32.AMADEY.YXDGKZ |
McAfee-GW-Edition | Artemis!Trojan |
FireEye | Generic.mg.10adfd55d2fe1b14 |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
Webroot | W32.Coins.Gen |
Gridinsoft | Malware.Win32.Downloader.cc |
Microsoft | Trojan:Win32/SpywareX.CRDB!MTB |
ZoneAlarm | HEUR:Trojan-PSW.Win32.Coins.gen |
Detected | |
Acronis | suspicious |
BitDefenderTheta | Gen:NN.ZexaF.36302.hqW@aG9InDn |
VBA32 | BScope.Trojan-Dropper.Injector |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | Trojan.Win32.AMADEY.YXDGKZ |
Rising | Trojan.Generic@AI.100 (RDML:IMGCJz7UY6UvSH03hyjlYA) |
Ikarus | Win32.Outbreak |
Fortinet | W32/PossibleThreat |
AVG | Win32:PWSX-gen [Trj] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |