Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 21, 2023, 6:09 p.m. | Sept. 21, 2023, 6:12 p.m. |
-
-
-
molua.exe "C:\Users\test22\AppData\Local\Temp\molua.exe"
2700
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.sarthaksrishticreation.com | 119.18.49.69 | |
www.gk84.com |
CNAME
gk84.com
|
107.148.223.82 |
www.gracefullytouchedartistry.com |
CNAME
cdn1.wixdns.net
|
34.149.87.45 |
www.giallozafferrano.com |
CNAME
giallozafferrano.com
|
62.149.128.45 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49171 -> 107.148.223.82:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49169 -> 34.149.87.45:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49168 -> 119.18.49.69:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49170 -> 62.149.128.45:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.sarthaksrishticreation.com/sy22/?kDHl=++s7hqRnDFs/g5YbNhmDQGydnZIcmR65wuKS6+wpOQxc/+r74UhYv08VjUB0PTEo7NuOximl&KtxD=PnCTGx9Pf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.gracefullytouchedartistry.com/sy22/?kDHl=32OyyUZHwqvJixPuiOQtM5MnMYIWhWk0yyAoMHrFdBB4wJvVGBkivZFh4+NGsLP7HahAbSBt&KtxD=PnCTGx9Pf | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.giallozafferrano.com/sy22/?kDHl=e3Wc7AYKmxnABbA5XplRDASPAW2hX0g2E4j6p3U7Sf2osunLtU3wLL64mGQYR58Cg+KdkSKM&KtxD=PnCTGx9Pf |
request | GET http://www.sarthaksrishticreation.com/sy22/?kDHl=++s7hqRnDFs/g5YbNhmDQGydnZIcmR65wuKS6+wpOQxc/+r74UhYv08VjUB0PTEo7NuOximl&KtxD=PnCTGx9Pf |
request | GET http://www.gracefullytouchedartistry.com/sy22/?kDHl=32OyyUZHwqvJixPuiOQtM5MnMYIWhWk0yyAoMHrFdBB4wJvVGBkivZFh4+NGsLP7HahAbSBt&KtxD=PnCTGx9Pf |
request | GET http://www.giallozafferrano.com/sy22/?kDHl=e3Wc7AYKmxnABbA5XplRDASPAW2hX0g2E4j6p3U7Sf2osunLtU3wLL64mGQYR58Cg+KdkSKM&KtxD=PnCTGx9Pf |
file | C:\Users\test22\AppData\Local\Temp\molua.exe |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Strab.4!c |
MicroWorld-eScan | Gen:Variant.Fragtor.365975 |
FireEye | Generic.mg.5c6c71c7d5550896 |
McAfee | Artemis!5C6C71C7D555 |
Cylance | unsafe |
Sangfor | Suspicious.Win32.Save.ins |
Arcabit | Trojan.Fragtor.D59597 |
BitDefenderTheta | Gen:NN.ZexaF.36722.muW@a8mWE!ci |
Cyren | W32/Injector.BRB.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.ETHU |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | UDS:Trojan.Win32.Strab.gen |
BitDefender | Gen:Variant.Fragtor.365975 |
Avast | FileRepMalware [Pws] |
Emsisoft | Gen:Variant.Fragtor.365975 (B) |
VIPRE | Gen:Variant.Fragtor.365975 |
McAfee-GW-Edition | BehavesLike.Win32.Downloader.fc |
Trapmine | malicious.moderate.ml.score |
Sophos | Generic ML PUA (PUA) |
Ikarus | Trojan.Win32.Injector |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Gen:Variant.Fragtor.365975 |
Detected | |
AhnLab-V3 | Malware/Win.Generic.C4960464 |
VBA32 | BScope.Trojan.Injector |
ALYac | Gen:Variant.Fragtor.365975 |
MAX | malware (ai score=80) |
Malwarebytes | Generic.Malware/Suspicious |
Panda | Trj/GdSda.A |
Rising | Trojan.Generic@AI.100 (RDML:U8iYSeUSHrVyjod1styS8Q) |
SentinelOne | Static AI - Suspicious PE |
Fortinet | NSIS/Injector.ETGJ!tr |
AVG | FileRepMalware [Pws] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |