Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 21, 2023, 7:52 a.m. | Nov. 21, 2023, 7:59 a.m. |
-
-
-
nrcrae.exe "C:\Users\test22\AppData\Local\Temp\nrcrae.exe"
2716
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
geoplugin.net | 178.237.33.50 | |
sheddy1122.ddns.net | 103.212.81.155 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2028675 | ET POLICY DNS Query to DynDNS Domain *.ddns .net | Potentially Bad Traffic |
TCP 192.168.56.101:49166 -> 103.212.81.155:6524 | 2036594 | ET JA3 Hash - Remcos 3.x TLS Connection | Malware Command and Control Activity Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.101:49166 103.212.81.155:6524 |
None | None | None |
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://geoplugin.net/json.gp |
domain | sheddy1122.ddns.net |
request | GET http://geoplugin.net/json.gp |
file | C:\Users\test22\AppData\Roaming\oxttdmmhqq\mvvfbkktp.exe |
file | C:\Users\test22\AppData\Local\Temp\nrcrae.exe |
file | C:\Users\test22\AppData\Roaming\oxttdmmhqq\mvvfbkktp.exe |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\pyuuennjsc | reg_value | C:\Users\test22\AppData\Roaming\oxttdmmhqq\mvvfbkktp.exe "C:\Users\test22\AppData\Local\Temp\nrcrae.exe" |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Strab.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.NSISX.Spy.Gen.24 |
Skyhigh | BehavesLike.Win32.Generic.hc |
ALYac | Trojan.NSISX.Spy.Gen.24 |
Cylance | unsafe |
VIPRE | Trojan.NSISX.Spy.Gen.24 |
Sangfor | Spyware.Win32.Agent.V3sk |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
Kaspersky | UDS:Trojan.Win32.Strab.gen |
BitDefender | Trojan.NSISX.Spy.Gen.24 |
Avast | FileRepMalware [Rat] |
Emsisoft | Trojan.NSISX.Spy.Gen.24 (B) |
DrWeb | Trojan.DownLoader46.33770 |
FireEye | Generic.mg.0a1d0f4a278dff18 |
Sophos | Mal/Generic-S |
MAX | malware (ai score=80) |
Detected | |
Varist | W32/Strab.O.gen!Eldorado |
Kingsoft | malware.kb.a.822 |
Microsoft | Trojan:Win32/Formbook!ml |
Arcabit | Trojan.NSISX.Spy.Gen.24 |
ZoneAlarm | HEUR:Backdoor.Win32.Remcos.gen |
GData | Trojan.NSISX.Spy.Gen.24 |
McAfee | Artemis!0A1D0F4A278D |
Malwarebytes | Generic.Malware/Suspicious |
Panda | Trj/Chgt.AD |
Rising | Trojan.Generic@AI.100 (RDML:VAFfLoqcddUQTZKCi3KpAQ) |
Fortinet | NSIS/Agent.DCAC!tr |
BitDefenderTheta | Gen:NN.ZexaF.36792.lmW@a4umjin |
AVG | FileRepMalware [Rat] |
DeepInstinct | MALICIOUS |