Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 24, 2023, 5:21 p.m. | July 24, 2023, 5:24 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
geo.netsupportsoftware.com | 62.172.138.8 | |
unclesrug32.com | ||
unclesrug31.com | 185.209.30.136 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49170 -> 62.172.138.8:80 | 2034559 | ET POLICY NetSupport GeoLocation Lookup Request | Potential Corporate Privacy Violation |
TCP 192.168.56.102:49169 -> 62.172.138.8:80 | 2034559 | ET POLICY NetSupport GeoLocation Lookup Request | Potential Corporate Privacy Violation |
TCP 192.168.56.102:49166 -> 62.172.138.8:80 | 2034559 | ET POLICY NetSupport GeoLocation Lookup Request | Potential Corporate Privacy Violation |
Suricata TLS
No Suricata TLS
suspicious_features | GET method with no useragent header | suspicious_request | GET http://geo.netsupportsoftware.com/location/loca.asp |
request | GET http://geo.netsupportsoftware.com/location/loca.asp |
Zillya | Trojan.GenCBL.Win32.9416 |
Cyren | W32/Tool.EQYN-2153 |
Kaspersky | not-a-virus:RemoteAdmin.Win32.NetSup.i |
DrWeb | Program.RemoteAdmin.837 |
Jiangmin | RemoteAdmin.NetSup.h |
ZoneAlarm | not-a-virus:HEUR:RemoteAdmin.Win32.NetSup.gen |
Detected | |
Rising | HackTool.NetSupport!1.E317 (CLASSIC) |
Yandex | Riskware.RemoteAdmin!myez5VmqQPE |
MaxSecure | Trojan.Malware.73446946.susgen |
Fortinet | Riskware/Application |
dead_host | 185.209.30.136:1313 |