Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 2, 2024, 9:52 a.m. | Sept. 2, 2024, 9:59 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
sevxv17pt.top | 195.133.13.230 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:52760 -> 164.124.101.2:53 | 2023883 | ET DNS Query to a *.top domain - Likely Hostile | Potentially Bad Traffic |
TCP 192.168.56.103:49162 -> 195.133.13.230:80 | 2054350 | ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 | A Network Trojan was detected |
TCP 192.168.56.103:49162 -> 195.133.13.230:80 | 2023882 | ET INFO HTTP Request to a *.top domain | Potentially Bad Traffic |
TCP 192.168.56.103:49162 -> 195.133.13.230:80 | 2054350 | ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 | A Network Trojan was detected |
TCP 192.168.56.103:49162 -> 195.133.13.230:80 | 2054350 | ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
suspicious_features | POST method with no referer header | suspicious_request | POST http://sevxv17pt.top/v1/upload.php |
request | POST http://sevxv17pt.top/v1/upload.php |
request | POST http://sevxv17pt.top/v1/upload.php |
domain | sevxv17pt.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Local\Temp\BawuYOCdGNZiqevXAMeS.dll |
file | C:\Users\test22\AppData\Local\Temp\service123.exe |
section | {u'size_of_data': u'0x000e2400', u'virtual_address': u'0x00b39000', u'entropy': 6.841635613240144, u'name': u'.reloc', u'virtual_size': u'0x000e22dc'} | entropy | 6.84163561324 | description | A section with a high entropy has been found |
Elastic | malicious (high confidence) |
ALYac | Generic.Dacic.3683.930236D9 |
VIPRE | Generic.Dacic.3683.930236D9 |
K7AntiVirus | Password-Stealer ( 0054cf561 ) |
BitDefender | Generic.Dacic.3683.930236D9 |
K7GW | Password-Stealer ( 0054cf561 ) |
Arcabit | Generic.Dacic.3683.930236D9 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/PSW.Agent.OGR |
APEX | Malicious |
Avast | Win32:Evo-gen [Trj] |
ClamAV | Win.Malware.Barys-10032866-0 |
Kaspersky | VHO:Trojan-PSW.Win32.Stealer.gen |
MicroWorld-eScan | Generic.Dacic.3683.930236D9 |
Rising | Trojan.CryptBot!8.19865 (TFE:5:du8Y4XG1zuF) |
Emsisoft | Generic.Dacic.3683.930236D9 (B) |
FireEye | Generic.Dacic.3683.930236D9 |
Detected | |
MAX | malware (ai score=88) |
Microsoft | Trojan:Win32/CryptBot.CCJD!MTB |
ZoneAlarm | VHO:Trojan-PSW.Win32.Stealer.gen |
GData | Win32.Trojan.PSE.1D64ECY |
AhnLab-V3 | Trojan/Win.CryptBot.C5659071 |
BitDefenderTheta | Gen:NN.ZexaF.36812.@@Z@aCOEHzb |
Malwarebytes | Spyware.Stealer |
Ikarus | Trojan-PSW.Agent |
Panda | Trj/Genetic.gen |
Fortinet | W32/Agent.OGR!tr |
AVG | Win32:Evo-gen [Trj] |
CrowdStrike | win/malicious_confidence_70% (D) |