Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 17, 2023, 7:34 a.m. | Aug. 17, 2023, 7:36 a.m. |
-
-
chcp.com chcp 65001
1528 -
netsh.exe netsh wlan show profile
1864 -
findstr.exe findstr All
2708
-
Name | Response | Post-Analysis Lookup |
---|---|---|
apps.identrust.com |
CNAME
a1952.dscq.akamai.net
CNAME
identrust.edgesuite.net
|
23.67.53.17 |
icanhazip.com | 104.18.114.97 | |
api.mylnikov.org | 172.67.196.114 | |
api.telegram.org | 149.154.167.220 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
suspicious_features | GET method with no useragent header | suspicious_request | GET http://icanhazip.com/ |
request | GET http://icanhazip.com/ |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
domain | icanhazip.com |
cmdline | chcp 65001 |
cmdline | netsh wlan show networks mode=bssid |
cmdline | netsh wlan show profile |
Lionic | Trojan.Win32.Stealer.12!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.YakbeexMSIL.ZZ4 |
ALYac | Generic.Dacic.1E3438B6.A.43F93EE2 |
Malwarebytes | Generic.Malware.AI.DDS |
Zillya | Trojan.Agent.Win32.2981387 |
Sangfor | Virus.Win32.Save.a |
Alibaba | Backdoor:MSIL/AsyncRAT.5d077d10 |
Cybereason | malicious.e40a4e |
VirIT | Trojan.Win32.MSIL_Heur.B |
Cyren | W32/MSIL_Agent.BTI.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of MSIL/Agent.CFW |
APEX | Malicious |
ClamAV | Win.Packed.AsyncRAT-9856570-1 |
Kaspersky | HEUR:Trojan-PSW.MSIL.Stealer.gen |
BitDefender | Generic.Dacic.1E3438B6.A.43F93EE2 |
ViRobot | Trojan.Win.Z.Dacic.179200.AC |
MicroWorld-eScan | Generic.Dacic.1E3438B6.A.43F93EE2 |
Avast | Win32:KeyloggerX-gen [Trj] |
Rising | Stealer.Agent!1.D483 (CLASSIC) |
Emsisoft | Generic.Dacic.1E3438B6.A.43F93EE2 (B) |
DrWeb | BackDoor.AsyncRATNET.3 |
VIPRE | Generic.Dacic.1E3438B6.A.43F93EE2 |
TrendMicro | Trojan.Win32.AMADEY.YXDHPZ |
McAfee-GW-Edition | BehavesLike.Win32.Generic.cm |
FireEye | Generic.mg.67c418ee40a4edb8 |
Sophos | Mal/AsyncRat-C |
Ikarus | Trojan-Spy.StormKitty |
GData | MSIL.Backdoor.DCRat.D |
Jiangmin | Trojan.MSIL.amfgq |
MAX | malware (ai score=80) |
Antiy-AVL | Trojan[Backdoor]/MSIL.Crysan |
Gridinsoft | Trojan.Win32.AsyncRAT.bot |
Arcabit | Generic.Dacic.1E3438B6.A.43F93EE2 |
SUPERAntiSpyware | Trojan.Agent/Gen-Crypt |
ZoneAlarm | HEUR:Trojan-PSW.MSIL.Stealer.gen |
Microsoft | Backdoor:MSIL/AsyncRAT.GG!MTB |
Detected | |
AhnLab-V3 | Backdoor/Win.AsyncRAT.C4932402 |
Acronis | suspicious |
McAfee | GenericRXVE-ZP!67C418EE40A4 |
TACHYON | Backdoor/W32.DN-Crysan.179200 |
VBA32 | Trojan.MSIL.InfoStealer.gen.D |
Cylance | unsafe |
Panda | Trj/CI.A |
TrendMicro-HouseCall | Trojan.Win32.AMADEY.YXDHPZ |
Tencent | Malware.Win32.Gencirc.10bc9d0e |
SentinelOne | Static AI - Malicious PE |