Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 14, 2023, 12:53 p.m. | Oct. 14, 2023, 12:59 p.m. |
-
AppaltQD.exe "C:\Users\test22\AppData\Local\Temp\AppaltQD.exe"
840
Name | Response | Post-Analysis Lookup |
---|---|---|
www.ieee802.org | 54.84.190.55 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 54.84.190.55:443 -> 192.168.56.103:49163 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 54.84.190.55:443 -> 192.168.56.103:49161 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 192.168.56.103:49163 -> 54.84.190.55:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49161 -> 54.84.190.55:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 54.84.190.55:443 -> 192.168.56.103:49164 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
pdb_path | p:\router\proxy\dzb\url\Framework\3A\x64\desktop\b5v.pdb |
resource name | FEATURE |
name | FEATURE | language | LANG_CHINESE | filetype | ASCII text, with no line terminators | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00057228 | size | 0x00000097 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000572c0 | size | 0x00005922 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005cbe4 | size | 0x000000ae | ||||||||||||||||||
name | RT_RCDATA | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005cc94 | size | 0x00000080 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005cd14 | size | 0x00000014 | ||||||||||||||||||
name | RT_MANIFEST | language | LANG_CHINESE | filetype | ASCII text, with CRLF line terminators | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005cf78 | size | 0x0000015a |
section | {u'size_of_data': u'0x00006200', u'virtual_address': u'0x00057000', u'entropy': 7.68218947159801, u'name': u'.rsrc', u'virtual_size': u'0x000060d2'} | entropy | 7.6821894716 | description | A section with a high entropy has been found |
MicroWorld-eScan | Trojan.GenericKD.69762698 |
FireEye | Trojan.GenericKD.69762698 |
McAfee | Artemis!1A687A4C22BF |
Cylance | unsafe |
BitDefender | Trojan.GenericKD.69762698 |
Emsisoft | Trojan.GenericKD.69762698 (B) |
Microsoft | TrojanDropper:Win32/Vigorf.A |
GData | Trojan.GenericKD.69762698 |
MAX | malware (ai score=80) |
VBA32 | suspected of Trojan.Downloader.gen |
TrendMicro-HouseCall | TROJ_GEN.R002V01JA23 |
DeepInstinct | MALICIOUS |
CrowdStrike | win/grayware_confidence_60% (W) |