Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 23, 2024, 2:53 p.m. | July 23, 2024, 2:56 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
tveight8vs.top | 185.68.93.123 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 185.68.93.123:80 -> 192.168.56.102:49186 | 2400030 | ET DROP Spamhaus DROP Listed Traffic Inbound group 31 | Misc Attack |
UDP 192.168.56.102:63709 -> 164.124.101.2:53 | 2054389 | ET MALWARE Cryptbot CnC DGA Domain (eight8) | A Network Trojan was detected |
UDP 192.168.56.102:63709 -> 164.124.101.2:53 | 2023883 | ET DNS Query to a *.top domain - Likely Hostile | Potentially Bad Traffic |
TCP 192.168.56.102:49186 -> 185.68.93.123:80 | 2054350 | ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 | A Network Trojan was detected |
TCP 192.168.56.102:49186 -> 185.68.93.123:80 | 2023882 | ET INFO HTTP Request to a *.top domain | Potentially Bad Traffic |
TCP 192.168.56.102:49187 -> 185.68.93.123:80 | 2054350 | ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 | A Network Trojan was detected |
TCP 192.168.56.102:49188 -> 185.68.93.123:80 | 2054350 | ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
suspicious_features | POST method with no referer header | suspicious_request | POST http://tveight8vs.top/v1/upload.php |
request | POST http://tveight8vs.top/v1/upload.php |
request | POST http://tveight8vs.top/v1/upload.php |
domain | tveight8vs.top | description | Generic top level domain TLD |
NANO-Antivirus | Virus.Win32.Gen.ccmw |
DrWeb | Program.Unwanted.5065 |