Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Aug. 26, 2024, 9:35 a.m. | Aug. 26, 2024, 9:42 a.m. |
-
build9.exe "C:\Users\test22\AppData\Local\Temp\build9.exe"
652
Name | Response | Post-Analysis Lookup |
---|---|---|
jirafasaltas.fun | 172.67.193.102 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49163 -> 172.67.193.102:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49163 172.67.193.102:443 |
C=US, O=Google Trust Services, CN=WE1 | CN=jirafasaltas.fun | 31:71:0c:85:3c:07:8e:e4:0c:d8:9c:4a:a0:f4:b1:9a:6e:06:35:17 |
suspicious_features | POST method with no referer header | suspicious_request | POST https://jirafasaltas.fun/b3-205451?um3ickbumck=jtrAm6FtGDmmrAtei2CBfxKwUe2D8I1G8jaRTth%2BhOJvhN50mwPlZBcgVsKnGVYei25HaV5GyBWUn1y8fD5lWg%3D%3D |
request | POST https://jirafasaltas.fun/b3-205451?um3ickbumck=jtrAm6FtGDmmrAtei2CBfxKwUe2D8I1G8jaRTth%2BhOJvhN50mwPlZBcgVsKnGVYei25HaV5GyBWUn1y8fD5lWg%3D%3D |
request | POST https://jirafasaltas.fun/b3-205451?um3ickbumck=jtrAm6FtGDmmrAtei2CBfxKwUe2D8I1G8jaRTth%2BhOJvhN50mwPlZBcgVsKnGVYei25HaV5GyBWUn1y8fD5lWg%3D%3D |
section | {u'size_of_data': u'0x0000c800', u'virtual_address': u'0x001d5000', u'entropy': 7.884018071893988, u'name': u'.data', u'virtual_size': u'0x0000c640'} | entropy | 7.88401807189 | description | A section with a high entropy has been found |
registry | HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2 Override |
registry | HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Sessions |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.SleepObf.4!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Trojan.Win64 |
ALYac | Trojan.GenericKD.73875671 |
Cylance | Unsafe |
VIPRE | Trojan.GenericKD.73875671 |
Sangfor | Trojan.Win64.Kryptik.Vc2e |
K7AntiVirus | Trojan ( 005b85c31 ) |
BitDefender | Trojan.GenericKD.73875671 |
K7GW | Trojan ( 005b85c31 ) |
Arcabit | Trojan.Generic.D46740D7 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win64/Kryptik.EMS |
APEX | Malicious |
McAfee | Artemis!4E18E7B1280E |
Avast | Win64:CrypterX-gen [Trj] |
Kaspersky | Trojan.Win64.SleepObf.gg |
Alibaba | Trojan:Win64/SleepObf.79070aa3 |
MicroWorld-eScan | Trojan.GenericKD.73875671 |
Rising | Trojan.Kryptik!8.8 (CLOUD) |
Emsisoft | Trojan.GenericKD.73875671 (B) |
F-Secure | Trojan.TR/Kryptik.icaaj |
TrendMicro | Trojan.Win64.AMADEY.YXEHTZ |
McAfeeD | ti!30B84843ED02 |
Trapmine | malicious.moderate.ml.score |
FireEye | Generic.mg.4e18e7b1280ebf97 |
Sophos | Mal/Generic-S |
Detected | |
Avira | TR/Kryptik.icaaj |
MAX | malware (ai score=82) |
Antiy-AVL | Trojan/Win64.SleepObf |
Microsoft | Trojan:Win32/Phonzy.A!ml |
ViRobot | Trojan.Win.Z.Wacatac.2052608 |
ZoneAlarm | Trojan.Win64.SleepObf.gg |
GData | Trojan.GenericKD.73875671 |
AhnLab-V3 | Trojan/Win.TrojanX-gen.C5656555 |
DeepInstinct | MALICIOUS |
Malwarebytes | Trojan.ShellCode |
Ikarus | Trojan.Win64.Crypt |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | Trojan.Win64.AMADEY.YXEHTZ |
Tencent | Malware.Win32.Gencirc.14174774 |
MaxSecure | Trojan.Malware.276088877.susgen |
Fortinet | W64/Kryptik.EMS!tr |
AVG | Win64:CrypterX-gen [Trj] |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_100% (W) |
alibabacloud | Trojan:Win/Wacatac.B9nj |