Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Nov. 21, 2023, 7:52 a.m. | Nov. 21, 2023, 7:54 a.m. |
-
test20.exe "C:\Users\test22\AppData\Local\Temp\test20.exe"
1952
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
179.60.147.176 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .symtab |
suspicious_features | Connection to IP address | suspicious_request | GET http://179.60.147.176:8080/client | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://179.60.147.176:8080/health | ||||||
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST http://179.60.147.176:8080/device |
request | GET http://179.60.147.176:8080/client |
request | GET http://179.60.147.176:8080/health |
request | POST http://179.60.147.176:8080/device |
request | POST http://179.60.147.176:8080/device |
host | 179.60.147.176 |
Bkav | W64.AIDetectMalware |
Malwarebytes | RiskWare.RemoteAdmin.Chaos |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of WinGo/RemoteAdmin.Chaos.D potentially unsafe |
APEX | Malicious |
ClamAV | Win.Malware.Chaos-10009236-0 |
Kaspersky | HEUR:Backdoor.Win64.Agent.gen |
Sophos | ATK/Chaos-C |
Detected | |
Varist | W64/Agent.EUK.gen!Eldorado |
ZoneAlarm | HEUR:Backdoor.Win64.Agent.gen |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Malware/Win.Khaosz.R575825 |
DeepInstinct | MALICIOUS |
Ikarus | Trojan.SuspectCRC |
MaxSecure | Trojan.Malware.300983.susgen |