Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Dec. 14, 2023, 6:52 p.m. | Dec. 14, 2023, 6:56 p.m. |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 154.92.16.100:80 -> 192.168.56.101:49161 | 2045860 | ET HUNTING Rejetto HTTP File Sever Response | A Network Trojan was detected |
Suricata TLS
pdb_path | D:\ä¸æ¹ Visual Studio 2022\HTML\Release\HTML.pdb |
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://154.92.16.100/Admin/Admin.html |
request | GET http://154.92.16.100/Admin/Admin.html |
Bkav | W32.AIDetectMalware |
Elastic | malicious (high confidence) |
Avast | FileRepMalware [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Microsoft | Trojan:Win32/Wacatac.B!ml |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
VBA32 | SigCompromised.MEDIATEKINC |
AVG | FileRepMalware [Trj] |
CrowdStrike | win/malicious_confidence_100% (W) |
host | 154.92.16.100 | |||
host | 38.181.25.204 |