Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 9, 2024, 9:22 a.m. | Aug. 9, 2024, 9:24 a.m. |
-
-
-
Gmve9T42uH5af2pxVBRXt6Er.exe "C:\Users\test22\Pictures\Gmve9T42uH5af2pxVBRXt6Er.exe"
2852
-
-
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.101:49166 20.200.245.247:443 |
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo ECC Domain Validation Secure Server CA | CN=github.com | e7:03:5b:cc:1c:18:77:1f:79:2f:90:86:6b:6c:1d:f8:df:aa:bd:c0 |
TLS 1.2 192.168.56.101:49169 185.199.111.133:443 |
C=US, O=DigiCert Inc, CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1 | C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=*.github.io | 97:d8:c5:70:0f:12:24:6c:88:bc:fa:06:7e:8c:a7:4d:a8:62:67:28 |
TLS 1.2 192.168.56.101:49170 162.159.133.233:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=discordapp.com | 97:8b:ee:ad:1e:bf:a1:69:e7:94:29:f7:55:7a:29:64:19:c7:81:39 |
TLS 1.2 192.168.56.101:49164 104.20.3.235:443 |
C=US, O=Google Trust Services, CN=WE1 | CN=pastebin.com | 82:49:c5:04:9a:bd:a9:c1:ab:4d:ff:95:b9:94:74:cc:40:bc:09:7f |
TLS 1.2 192.168.56.101:49167 104.21.79.77:443 |
C=US, O=Google Trust Services, CN=WE1 | CN=yip.su | cd:f2:dd:c5:ee:57:d1:5f:01:8c:10:00:ac:b5:85:96:0e:f7:0a:32 |
TLS 1.2 192.168.56.101:49172 104.21.76.57:443 |
C=US, O=Google Trust Services, CN=WE1 | CN=iplogger.com | ff:db:b3:bf:95:97:b5:c1:dd:90:3f:4c:9a:d3:69:3b:39:78:66:96 |
pdb_path | ÷LGÈ#G¾½/¬É]ÈSdbX>kvGð¿ëþ{ç´IòÚ)PûØ °îª°r >ÄæÏ#Ôµ[¤ÐH,s7à$eeMhj |
section | .managed |
section | hydrated |
resource name | BINARY |
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://194.58.114.223/d/385121 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://ironmanrecycling.com/get/setup1.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://pastebin.com/raw/xYhKBupz | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://github.com/evan9908/Setup/raw/main/Filemy.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://cdn.discordapp.com/attachments/1271038807315185718/1271141520195715093/setup.exe?ex=66b6424b&is=66b4f0cb&hm=de560db8ff6dd3fa9ac31172f1bd3d348b35190c8d570ea98c882ca3b5c00fdd& | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://yip.su/RNWPd.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://iplogger.com/1uNwK4 |
request | GET http://194.58.114.223/d/385121 |
request | GET http://ironmanrecycling.com/get/setup1.exe |
request | GET https://pastebin.com/raw/xYhKBupz |
request | GET https://github.com/evan9908/Setup/raw/main/Filemy.exe |
request | GET https://cdn.discordapp.com/attachments/1271038807315185718/1271141520195715093/setup.exe?ex=66b6424b&is=66b4f0cb&hm=de560db8ff6dd3fa9ac31172f1bd3d348b35190c8d570ea98c882ca3b5c00fdd& |
request | GET https://yip.su/RNWPd.exe |
request | GET https://iplogger.com/1uNwK4 |
domain | yip.su | description | Soviet Union domain TLD |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SPn8Rj3ST7TdE9SdoZ97brm9.bat |
file | C:\Users\test22\AppData\Local\ynJjrs4lmoB9BYSHCM7P963B.exe |
file | C:\Users\test22\Pictures\7Rhe9M4GgyAVkmvttYuyr6j3.exe |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nQNC6ySAsopWCVZx3Yt6kwsU.bat |
file | C:\Users\test22\Pictures\Gmve9T42uH5af2pxVBRXt6Er.exe |
file | C:\Users\test22\AppData\Local\xMKTkOlDSnrEwAao3HHx8qqW.exe |
file | C:\Users\test22\AppData\Local\ynJjrs4lmoB9BYSHCM7P963B.exe |