Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Dec. 11, 2023, 7:15 p.m. | Dec. 11, 2023, 7:20 p.m. |
-
DLL%20Injector%20Resou%E2%80%AEnls..scr "C:\Users\test22\AppData\Local\Temp\DLL%20Injector%20Resou%E2%80%AEnls..scr"
1664
Name | Response | Post-Analysis Lookup |
---|---|---|
apps.identrust.com |
CNAME
a1952.dscq.akamai.net
CNAME
identrust.edgesuite.net
|
23.67.53.17 |
textbin.net | 148.72.177.212 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49161 -> 148.72.177.212:443 | 2037786 | ET INFO Pastebin-style Service (textbin .net in TLS SNI) | Potentially Bad Traffic |
TCP 192.168.56.103:49161 -> 148.72.177.212:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49161 148.72.177.212:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=textbin.net | e2:02:74:4e:e5:be:7e:79:a1:a7:e9:2e:d7:28:2d:19:26:9b:a6:92 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
section | {u'size_of_data': u'0x00084c00', u'virtual_address': u'0x000d4000', u'entropy': 7.9990786824538995, u'name': u'UPX1', u'virtual_size': u'0x00085000'} | entropy | 7.99907868245 | description | A section with a high entropy has been found | |||||||||
entropy | 0.931578947368 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX | ||||||
section | UPX2 | description | Section name indicates UPX |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Generic.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.70623876 |
FireEye | Generic.mg.b6d15bc82d811c30 |
Skyhigh | BehavesLike.Win64.VirRansom.hc |
ALYac | Trojan.GenericKD.70623876 |
Malwarebytes | Malware.AI.3982124035 |
VIPRE | Trojan.GenericKD.70623876 |
Sangfor | Trojan.Win32.Agent.Vojf |
Cybereason | malicious.1e8bb3 |
Symantec | ML.Attribute.HighConfidence |
Cynet | Malicious (score: 100) |
APEX | Malicious |
BitDefender | Trojan.GenericKD.70623876 |
Avast | Win64:BankerX-gen [Trj] |
Emsisoft | Trojan.GenericKD.70623876 (B) |
TrendMicro | TROJ_GEN.R002C0DLB23 |
Trapmine | suspicious.low.ml.score |
Sophos | Mal/Generic-S |
Ikarus | Trojan-Downloader.Win64.Agent |
Webroot | W32.Trojan.GenKD |
Antiy-AVL | Trojan/Win32.Sabsik |
Microsoft | Trojan:Win32/AsyncRat!MSR |
Gridinsoft | Ransom.Win64.Sabsik.sa |
Xcitium | Malware@#11oix1jgwmc99 |
Arcabit | Trojan.Generic.D435A284 |
ViRobot | Trojan.Win.Z.Agent.584704.CJ |
GData | Trojan.GenericKD.70623876 |
Detected | |
AhnLab-V3 | Trojan/Win.Generic.R612138 |
McAfee | Artemis!B6D15BC82D81 |
MAX | malware (ai score=85) |
Cylance | unsafe |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | TROJ_GEN.R002C0DLB23 |
Rising | Exploit.Convagent!8.12632 (TFE:5:hFui1khqHgV) |
MaxSecure | Trojan.Malware.221151308.susgen |
Fortinet | W32/PossibleThreat |
AVG | Win64:BankerX-gen [Trj] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |