Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 20, 2023, 7:27 a.m. | Oct. 20, 2023, 7:33 a.m. |
-
-
-
dapkqoihy.exe "C:\Users\test22\AppData\Local\Temp\dapkqoihy.exe"
2716
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.izeera.com |
CNAME
varun2365.github.io
|
185.199.111.153 |
www.verificardsa.com |
CNAME
verificardsa.com
|
23.145.120.242 |
www.nextino.app | 91.195.240.19 | |
www.jys639.com | 203.210.27.41 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49166 -> 203.210.27.41:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49170 -> 185.199.109.153:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49167 -> 23.145.120.242:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49171 -> 91.195.240.19:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.jys639.com/t6tg/?ARr=iZSd4WcVLoxrty2SI4zYYm+k8zxr4doV+JNRrflDFWaXgV8umUmWRFTZcO/6j4IcEfQ2bA86&ndlpdZ=u4itArTPyX7D | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.verificardsa.com/t6tg/?ARr=e3AQhDkaG9eafEaUpLL/rSilDzf/hET9ej10VBCXgx4U67QE0b9NWX3D0BBjP0VOu+agMW4z&ndlpdZ=u4itArTPyX7D | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.izeera.com/t6tg/?ARr=m529FBdnR7W3BTzP5MxjwgE+mkLjoMm+UZfynz2FhzEQtAjK+eSB/JNk4Nuy1iudF5erJ+NJ&ndlpdZ=u4itArTPyX7D | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.nextino.app/t6tg/?ARr=hbKaBdJJ6vFN8tzB35DGgEHrZG9ClC0kvKQfUGuMd838c0khCL09IqdRU/B5FhQhg2CjjGkb&ndlpdZ=u4itArTPyX7D |
request | GET http://www.jys639.com/t6tg/?ARr=iZSd4WcVLoxrty2SI4zYYm+k8zxr4doV+JNRrflDFWaXgV8umUmWRFTZcO/6j4IcEfQ2bA86&ndlpdZ=u4itArTPyX7D |
request | GET http://www.verificardsa.com/t6tg/?ARr=e3AQhDkaG9eafEaUpLL/rSilDzf/hET9ej10VBCXgx4U67QE0b9NWX3D0BBjP0VOu+agMW4z&ndlpdZ=u4itArTPyX7D |
request | GET http://www.izeera.com/t6tg/?ARr=m529FBdnR7W3BTzP5MxjwgE+mkLjoMm+UZfynz2FhzEQtAjK+eSB/JNk4Nuy1iudF5erJ+NJ&ndlpdZ=u4itArTPyX7D |
request | GET http://www.nextino.app/t6tg/?ARr=hbKaBdJJ6vFN8tzB35DGgEHrZG9ClC0kvKQfUGuMd838c0khCL09IqdRU/B5FhQhg2CjjGkb&ndlpdZ=u4itArTPyX7D |
file | C:\Users\test22\AppData\Local\Temp\dapkqoihy.exe |
section | {u'size_of_data': u'0x0000d000', u'virtual_address': u'0x00045000', u'entropy': 6.908730984606675, u'name': u'.rsrc', u'virtual_size': u'0x0000cf48'} | entropy | 6.90873098461 | description | A section with a high entropy has been found | |||||||||
entropy | 0.608187134503 | description | Overall entropy of this PE file is high |