Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 3, 2024, 6:35 p.m. | July 3, 2024, 6:44 p.m. |
-
-
client_win.exe "C:\Users\test22\AppData\Local\Temp\client_win.exe"
2800
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
file | C:\Users\test22\AppData\Local\Temp\_MEI26442\libcrypto-1_1.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26442\python38.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26442\VCRUNTIME140.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26442\libssl-1_1.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26442\libffi-7.dll |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Generic.4!c |
Skyhigh | BehavesLike.Win64.Suspicioustrojan.tc |
ALYac | Gen:Variant.Lazy.560823 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Lazy.560823 |
Sangfor | Trojan.Win32.Lazy.Vfsx |
BitDefender | Gen:Variant.Lazy.560823 |
APEX | Malicious |
McAfee | Artemis!9F478308A636 |
Avast | Win64:Evo-gen [Trj] |
MicroWorld-eScan | Gen:Variant.Lazy.560823 |
Emsisoft | Gen:Variant.Lazy.560823 (B) |
Zillya | Trojan.Agent.Win32.3962631 |
McAfeeD | ti!544095B7F349 |
FireEye | Gen:Variant.Lazy.560823 |
MAX | malware (ai score=85) |
Gridinsoft | Trojan.Win64.Agent.sa |
Arcabit | Trojan.Lazy.D88EB7 |
GData | Gen:Variant.Lazy.560823 |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.4240893777 |
SentinelOne | Static AI - Suspicious PE |
Fortinet | W32/PossibleThreat |
AVG | Win64:Evo-gen [Trj] |
Paloalto | generic.ml |