Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 22, 2023, 1:20 p.m. | Nov. 22, 2023, 1:29 p.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\j-21.dll,Edge
2568 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\j-21.dll,
2652
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
112.213.101.150 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
suspicious_features | Connection to IP address | suspicious_request | GET http://112.213.101.150:8000/1 |
request | GET http://112.213.101.150:8000/1 |
file | C:\Users\test22\AppData\Roaming\XDxO0iFvly.exe |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\1[1] |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\1[1] |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\1[1] |
host | 112.213.101.150 |
Bkav | W32.AIDetectMalware |
MicroWorld-eScan | Gen:Variant.Doina.65070 |
Skyhigh | BehavesLike.Win32.NetLoader.lh |
McAfee | Trojan-FVWA!2C19732B70F2 |
Malwarebytes | Trojan.Downloader |
Zillya | Backdoor.Lotok.Win32.3545 |
Sangfor | Trojan.Win32.Agent.Acga |
CrowdStrike | win/malicious_confidence_90% (W) |
K7GW | Trojan-Downloader ( 005ac8791 ) |
K7AntiVirus | Trojan-Downloader ( 005ac8791 ) |
BitDefenderTheta | Gen:NN.ZedlaF.36792.eu4@aukuV8ki |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Agent.HHI |
APEX | Malicious |
ClamAV | Win.Trojan.Doina-10012690-0 |
Kaspersky | HEUR:Backdoor.Win32.Lotok.gen |
BitDefender | Gen:Variant.Doina.65070 |
NANO-Antivirus | Trojan.Win32.Lotok.kckclu |
Avast | Win32:RATX-gen [Trj] |
Tencent | Trojan.Win32.Agent_yh.16001053 |
Emsisoft | Gen:Variant.Doina.65070 (B) |
F-Secure | Trojan.TR/Dldr.Agent.tuwcb |
DrWeb | Trojan.DownLoader46.24420 |
VIPRE | Gen:Variant.Doina.65070 |
TrendMicro | TROJ_GEN.R011C0PK123 |
FireEye | Generic.mg.2c19732b70f22a5c |
Sophos | Troj/DwnLd-ANC |
MAX | malware (ai score=87) |
Jiangmin | Backdoor.Lotok.bxd |
Detected | |
Avira | TR/Dldr.Agent.tuwcb |
Varist | W32/S-c71d2f7c!Eldorado |
Antiy-AVL | Trojan[Backdoor]/Win32.Lotok |
Kingsoft | Win32.Hack.Lotok.gen |
Microsoft | Trojan:Win32/Lotok.EM!MTB |
Arcabit | Trojan.Doina.DFE2E |
ZoneAlarm | HEUR:Backdoor.Win32.Lotok.gen |
GData | Gen:Variant.Doina.65070 |
Cynet | Malicious (score: 99) |
AhnLab-V3 | Trojan/Win.Generic.R619293 |
VBA32 | Backdoor.Farfli |
ALYac | Gen:Variant.Doina.65070 |
Cylance | unsafe |
Panda | Trj/GdSda.A |
TrendMicro-HouseCall | TROJ_GEN.R011C0PK123 |
Rising | Downloader.Agent!1.EC5B (CLASSIC) |
Ikarus | Trojan-Downloader.Win32.Agent |
MaxSecure | Trojan.Malware.101018141.susgen |
Fortinet | W32/Agent.HHI!tr.dldr |