Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 23, 2024, 9:47 a.m. | Aug. 23, 2024, 9:49 a.m. |
-
Updater.exe "C:\Users\test22\AppData\Local\Temp\Updater.exe"
2540
Name | Response | Post-Analysis Lookup |
---|---|---|
xmr-eu1.nanopool.org | 162.19.224.121 | |
pastebin.com | 104.20.4.235 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49164 -> 104.20.4.235:443 | 906200068 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (CoinMiner) | undefined |
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2033268 | ET POLICY Observed DNS Query to Coin Mining Domain (nanopool .org) | Potential Corporate Privacy Violation |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.101:49164 104.20.4.235:443 |
None | None | None |
TLS 1.3 192.168.56.101:49163 163.172.154.142:10343 |
None | None | None |
TLS 1.3 192.168.56.101:49165 51.15.193.130:10343 |
None | None | None |
section | .00cfg |
section | .vmp0 |
section | .vmp1 |
section | {u'size_of_data': u'0x0092f400', u'virtual_address': u'0x00870000', u'entropy': 7.965108469031978, u'name': u'.vmp1', u'virtual_size': u'0x0092f328'} | entropy | 7.96510846903 | description | A section with a high entropy has been found | |||||||||
entropy | 0.99282170379 | description | Overall entropy of this PE file is high |
section | .vmp0 | description | Section name indicates VMProtect | ||||||
section | .vmp1 | description | Section name indicates VMProtect |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Reflo.4!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.Agent |
Skyhigh | BehavesLike.Win64.Generic.tc |
ALYac | Trojan.GenericKD.73779230 |
Cylance | Unsafe |
VIPRE | Trojan.GenericKD.73779230 |
Sangfor | Trojan.Win32.Reflo.Vwy5 |
K7AntiVirus | Trojan ( 0058dd1c1 ) |
BitDefender | Trojan.GenericKD.73779230 |
K7GW | Trojan ( 0058dd1c1 ) |
Cybereason | malicious.adbe78 |
Arcabit | Trojan.Generic.D465C81E |
VirIT | Trojan.Win64.Agent.HCV |
Symantec | Trojan.Gen.MBT |
ESET-NOD32 | a variant of Win32/Packed.VMProtect.ACR |
APEX | Malicious |
McAfee | Artemis!DD3AA70ADBE7 |
Avast | Win64:Evo-gen [Trj] |
Kaspersky | Trojan.Win32.Agent.xbrzux |
Alibaba | Trojan:Win64/Reflo.52972a68 |
MicroWorld-eScan | Trojan.GenericKD.73779230 |
Rising | Trojan.Agent!8.B1E (TFE:5:727qAG4EkQE) |
Emsisoft | Trojan.GenericKD.73779230 (B) |
F-Secure | Heuristic.HEUR/AGEN.1374773 |
DrWeb | Trojan.Siggen29.12565 |
Zillya | Trojan.VMProtect.Win32.96647 |
TrendMicro | TROJ_GEN.R002C0XGT24 |
McAfeeD | Real Protect-LS!DD3AA70ADBE7 |
Trapmine | suspicious.low.ml.score |
FireEye | Generic.mg.dd3aa70adbe7894d |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Win32.VMProtect |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | HEUR/AGEN.1374773 |
MAX | malware (ai score=88) |
Antiy-AVL | GrayWare/Win32.Wacapew |
Kingsoft | Win32.Trojan.Agent.xbrzux |
Gridinsoft | Trojan.Win64.Packed.sa |
Xcitium | Malware@#2g1whylycqm7z |
Microsoft | Trojan:Win64/Reflo.HNS!MTB |
ViRobot | Trojan.Win.Z.Tedy.9701376 |
ZoneAlarm | Trojan.Win32.Agent.xbrzux |
GData | Trojan.GenericKD.73779230 |
AhnLab-V3 | Trojan/Win.Generic.R646909 |
DeepInstinct | MALICIOUS |
VBA32 | Trojan.CoinMiner |