Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 11, 2024, 11:10 a.m. | Oct. 11, 2024, 11:13 a.m. |
-
jgt.exe "C:\Users\test22\AppData\Local\Temp\jgt.exe"
444
Name | Response | Post-Analysis Lookup |
---|---|---|
justpaste.it | 83.168.108.45 | |
jaiodsnvzxkxcz5hvxzkighiwagfew9oi0d3219v687dyfsdg.su | 172.67.184.91 | |
pastebin.com | 104.20.3.235 | |
rentry.co | 104.26.2.16 | |
pool.supportxmr.com |
CNAME
pool-fr.supportxmr.com
|
141.94.96.195 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49163 141.94.96.71:443 |
C=IT, ST=Pool, L=Daemon, O=Mining Pool, CN=mining.pool | C=IT, ST=Pool, L=Daemon, O=Mining Pool, CN=mining.pool | 03:77:e8:c9:9c:cd:15:56:b7:2d:35:fc:01:90:83:6c:b5:42:f6:d0 |
TLS 1.3 192.168.56.103:49164 104.26.2.16:443 |
None | None | None |
TLS 1.3 192.168.56.103:49165 83.168.108.45:443 |
None | None | None |
TLS 1.3 192.168.56.103:49166 104.20.3.235:443 |
None | None | None |
TLS 1.3 192.168.56.103:49167 104.21.19.3:443 |
None | None | None |
section | .00cfg |
domain | jaiodsnvzxkxcz5hvxzkighiwagfew9oi0d3219v687dyfsdg.su | description | Soviet Union domain TLD |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Reflo.4!c |
Cynet | Malicious (score: 100) |
Skyhigh | Trojan-FWHP!1417D38C40D8 |
ALYac | Gen:Variant.Tedy.617597 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Tedy.617597 |
Sangfor | CoinMiner.Win64.Kryptik.Vdir |
CrowdStrike | win/malicious_confidence_70% (D) |
BitDefender | Gen:Variant.Tedy.617597 |
K7GW | Trojan ( 005af85d1 ) |
K7AntiVirus | Trojan ( 005af85d1 ) |
Arcabit | Trojan.Tedy.D96C7D |
Symantec | ML.Attribute.HighConfidence |
Elastic | Windows.Generic.Threat |
ESET-NOD32 | a variant of Win64/Kryptik.EDF |
APEX | Malicious |
Avast | Win64:Evo-gen [Trj] |
ClamAV | Win.Trojan.Genkryptik-10016533-0 |
Kaspersky | HEUR:Trojan.Win64.Reflo.pef |
Alibaba | Trojan:Win64/Coinminer.27bb4217 |
NANO-Antivirus | Trojan.Win64.Kryptik.ksokwe |
MicroWorld-eScan | Gen:Variant.Tedy.617597 |
Rising | Trojan.Staser!8.7FD (TFE:5:g2ZCviiLSKR) |
Emsisoft | Gen:Variant.Tedy.617597 (B) |
F-Secure | Heuristic.HEUR/AGEN.1370827 |
DrWeb | Trojan.Siggen29.48313 |
TrendMicro | TROJ_GEN.R002C0DJ824 |
McAfeeD | ti!5F7C6CDEA3C4 |
CTX | exe.trojan.kryptik |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
FireEye | Generic.mg.1417d38c40d85d1c |
Detected | |
Avira | HEUR/AGEN.1370827 |
Antiy-AVL | Trojan/Win64.GenKryptik |
Kingsoft | Win64.Trojan.Reflo.pef |
Gridinsoft | Trojan.Win64.CoinMiner.sa |
Microsoft | Trojan:Win64/Coinminer.RB!MTB |
ZoneAlarm | HEUR:Trojan.Win64.Reflo.pef |
GData | Gen:Variant.Tedy.617597 |
Varist | W64/Kryptik.LEG.gen!Eldorado |
AhnLab-V3 | Dropper/Win.DropperX-gen.R622355 |
McAfee | Trojan-FWHP!1417D38C40D8 |
DeepInstinct | MALICIOUS |
Malwarebytes | Trojan.Crypt.Generic |
Ikarus | Trojan.Win64.Krypt |
Panda | Trj/GdSda.A |
TrendMicro-HouseCall | TROJ_GEN.R002C0DJ824 |
Tencent | Trojan.Win64.Kryptik.hj |