Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 30, 2024, 9:25 a.m. | Sept. 30, 2024, 9:29 a.m. |
-
selena2.exe "C:\Users\test22\AppData\Local\Temp\selena2.exe"
2548
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
138.201.163.183 | Active | Moloch |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 138.201.163.183:443 -> 192.168.56.101:49162 | 2037563 | ET ATTACK_RESPONSE Havoc/Sliver Framework TLS Certificate Observed | A Network Trojan was detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49162 138.201.163.183:443 |
C=US, ST=Connecticut, L=Bridgeport, unknown=, unknown=3540, O=Tech Co, CN=138.201.163.183 | C=US, ST=Connecticut, L=Bridgeport, unknown=, unknown=3540, O=Tech Co, CN=138.201.163.183 | f2:fe:5c:d4:5e:a3:2d:1e:1c:ad:6d:f6:88:08:66:4e:40:70:60:de |
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST https://138.201.163.183/ |
request | POST https://138.201.163.183/ |
request | POST https://138.201.163.183/ |
section | {u'size_of_data': u'0x0001ca00', u'virtual_address': u'0x000b6000', u'entropy': 7.5962194103993435, u'name': u'.data', u'virtual_size': u'0x0001c880'} | entropy | 7.5962194104 | description | A section with a high entropy has been found |
host | 138.201.163.183 |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Havoc.4!c |
MicroWorld-eScan | Trojan.Generic.36827320 |
CTX | exe.trojan.generic |
McAfee | Artemis!229111FBCDDA |
Cylance | Unsafe |
VIPRE | Trojan.Generic.36827320 |
Sangfor | Trojan.Win64.Injector.Vo2t |
CrowdStrike | win/malicious_confidence_70% (D) |
Alibaba | Trojan:Win64/Injector.1f155dd8 |
K7GW | Trojan ( 005afddd1 ) |
K7AntiVirus | Trojan ( 005afddd1 ) |
Arcabit | Trojan.Generic.D231F0B8 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win64/Injector.OY |
APEX | Malicious |
Paloalto | generic.ml |
Cynet | Malicious (score: 99) |
BitDefender | Trojan.Generic.36827320 |
Emsisoft | Trojan.Generic.36827320 (B) |
Zillya | Trojan.Havoc.Win64.220 |
McAfeeD | ti!B24E7C066B84 |
Sophos | Generic Reputation PUA (PUA) |
FireEye | Generic.mg.229111fbcdda2ea5 |
Webroot | W32.Trojan.TR.Injector.yzifm |
Avira | TR/Injector.yzifm |
Antiy-AVL | Trojan[Injector]/Win64.Agent |
Kingsoft | Win32.Troj.Unknown.a |
Gridinsoft | Trojan.Win64.Downloader.sa |
Microsoft | Trojan:Win32/Wacatac.B!ml |
ViRobot | Trojan.Win.Z.Injector.1113120 |
GData | Win32.Packed.Injector.TBBDIJ |
Detected | |
AhnLab-V3 | Trojan/Win.Generic.R633197 |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.2870320396 |
Ikarus | Trojan.Win64.Agent |
Tencent | Malware.Win32.Gencirc.10c03549 |
huorong | HVM:Trojan/Injector.cp |
Fortinet | W64/Injector.OY!tr |
alibabacloud | Trojan:Win/Injector.ON |