Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 14, 2024, 9:39 a.m. | June 14, 2024, 9:43 a.m. |
-
setup%E4%B8%8B%E8%BD%BD%E5%90%8D%E5%8D%95%E7%9B%AE%E5%BD%956001.exe "C:\Users\test22\AppData\Local\Temp\setup%E4%B8%8B%E8%BD%BD%E5%90%8D%E5%8D%95%E7%9B%AE%E5%BD%956001.exe"
496
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
8.134.180.138 | Active | Moloch |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49161 -> 8.134.180.138:80 | 2003635 | ET MALWARE Suspicious User Agent Detected (RookIE) - Common with Downloaders | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
suspicious_features | Connection to IP address | suspicious_request | GET http://8.134.180.138/123.conf |
request | GET http://8.134.180.138/123.conf |
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0cc | size | 0x00000988 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0cc | size | 0x00000988 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0cc | size | 0x00000988 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0cc | size | 0x00000988 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0cc | size | 0x00000988 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0cc | size | 0x00000988 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0cc | size | 0x00000988 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0cc | size | 0x00000988 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006fa54 | size | 0x00000076 | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006facc | size | 0x00000570 |
host | 8.134.180.138 |
Lionic | Trojan.Win32.Agent.Y!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 99) |
ALYac | Gen:Variant.Doina.74560 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Doina.74560 |
Sangfor | Trojan.Win32.SilverFoxPrompt.swkaa |
K7AntiVirus | Trojan-Downloader ( 005607fa1 ) |
BitDefender | Gen:Variant.Doina.74560 |
K7GW | Trojan-Downloader ( 005607fa1 ) |
Arcabit | Trojan.Doina.D12340 |
VirIT | Trojan.Win64.Genus.GRJ |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win64/TrojanDownloader.Agent.EJ |
APEX | Malicious |
Avast | Win64:DropperX-gen [Drp] |
Kaspersky | Trojan-Downloader.Win32.Agent.xycslo |
Alibaba | TrojanDownloader:Win64/DropperX.c05607a1 |
MicroWorld-eScan | Gen:Variant.Doina.74560 |
Rising | Downloader.Agent!8.B23 (TFE:5:u1ZK0LTan7U) |
Emsisoft | Gen:Variant.Doina.74560 (B) |
F-Secure | Trojan.TR/Dldr.Agent.ihhav |
Zillya | Downloader.Agent.Win64.6323 |
TrendMicro | TROJ_GEN.R053C0XEC24 |
McAfeeD | ti!20A035C052C1 |
FireEye | Gen:Variant.Doina.74560 |
Sophos | Mal/Generic-S |
Ikarus | Trojan-Downloader.Win64.Agent |
Detected | |
Avira | TR/Dldr.Agent.ihhav |
MAX | malware (ai score=82) |
Antiy-AVL | Trojan/Win32.Wacatac |
Microsoft | Trojan:Win32/Znyonm |
ViRobot | Trojan.Win.Z.Agent.434688.F |
ZoneAlarm | Trojan-Downloader.Win32.Agent.xycslo |
GData | Gen:Variant.Doina.74560 |
Varist | W64/ABDownloader.OMOR-4271 |
AhnLab-V3 | Trojan/Win.Generic.C5619520 |
DeepInstinct | MALICIOUS |
VBA32 | TrojanDownloader.Agent |
Malwarebytes | Trojan.ShellCode |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | TROJ_GEN.R053C0XEC24 |
Tencent | Malware.Win32.Gencirc.11c0072e |
MaxSecure | Trojan.Malware.248600720.susgen |
Fortinet | W64/Agent.EJ!tr.dldr |
AVG | Win64:DropperX-gen [Drp] |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_90% (W) |
alibabacloud | Trojan[downloader]:Win/Agent.EG |