Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 14, 2024, 9:41 a.m. | Oct. 14, 2024, 9:50 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
bitbucket.org | 104.192.140.26 | |
pool.hashvault.pro | 131.153.76.130 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49171 -> 131.153.76.130:80 | 2024792 | ET POLICY Cryptocurrency Miner Checkin | Potential Corporate Privacy Violation |
TCP 192.168.56.103:49167 -> 104.192.140.24:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
UDP 192.168.56.103:50800 -> 164.124.101.2:53 | 2036289 | ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) | Crypto Currency Mining Activity Detected |
TCP 192.168.56.103:49166 -> 104.192.140.24:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49171 -> 131.153.76.130:80 | 2024792 | ET POLICY Cryptocurrency Miner Checkin | Potential Corporate Privacy Violation |
Suricata TLS
No Suricata TLS
pdb_path | D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb |
section | .didat |
resource name | PNG |
file | C:\Users\test22\AppData\Roaming\3.exe |
file | C:\Users\test22\AppData\Roaming\1.exe |
file | C:\Users\test22\AppData\Roaming\2.exe |
file | C:\Users\test22\AppData\Roaming\1.exe |
file | C:\Users\test22\AppData\Roaming\2.exe |
file | C:\Users\test22\AppData\Roaming\3.exe |
file | C:\Users\test22\AppData\Roaming\1.exe |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\NVIDIA Share | reg_value | C:\Users\test22\AppData\Roaming\ServiceAmd\3.exe |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Lumma.i!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Trojanpws.Lumma |
Skyhigh | BehavesLike.Win32.Trojan.vc |
ALYac | Trojan.Generic.36730258 |
Cylance | Unsafe |
VIPRE | Trojan.Generic.36730258 |
Sangfor | Infostealer.Win32.Kryptik.Vcfv |
K7AntiVirus | Riskware ( 00584baa1 ) |
BitDefender | Trojan.Generic.36730258 |
K7GW | Riskware ( 00584baa1 ) |
Arcabit | Trojan.Generic.D2307592 |
Symantec | Trojan.Gen.MBT |
McAfee | Artemis!403728207960 |
Avast | Win32:PWSX-gen [Trj] |
ClamAV | Win.Packed.Bladabindi-10017056-0 |
Kaspersky | Trojan-PSW.Win32.Lumma.avy |
Alibaba | TrojanPSW:Win64/Lumma.ee29731c |
MicroWorld-eScan | Trojan.Generic.36730258 |
Rising | Trojan.Generic!8.C3 (CLOUD) |
Emsisoft | Trojan.Generic.36730258 (B) |
F-Secure | Trojan.TR/AVI.Agent.tiwku |
DrWeb | Trojan.Siggen29.30270 |
TrendMicro | TrojanSpy.Win32.LUMMASTEALER.YXEH1Z |
McAfeeD | ti!313D9BF77DC4 |
FireEye | Generic.mg.403728207960ffa9 |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Win64.Bladabindi |
Detected | |
Avira | TR/AVI.Agent.tiwku |
MAX | malware (ai score=85) |
Antiy-AVL | Trojan[Banker]/Win32.ClipBanker |
Gridinsoft | Trojan.Win32.Agent.sa |
Microsoft | Trojan:Win32/Vigorf.A |
ZoneAlarm | Trojan-PSW.Win32.Lumma.avy |
GData | Trojan.Generic.36730258 |
Varist | W64/Injector.BMR.gen!Eldorado |
DeepInstinct | MALICIOUS |
Malwarebytes | Crypt.Trojan.MSIL.DDS |
Panda | Trj/CI.A |
TrendMicro-HouseCall | TrojanSpy.Win32.LUMMASTEALER.YXEH1Z |
Tencent | Win32.Trojan-QQPass.QQRob.Zchl |
Yandex | Trojan.Miner!gNQyxtA2zTA |
MaxSecure | Trojan.Malware.276510682.susgen |
Fortinet | W32/PossibleThreat |
AVG | Win32:PWSX-gen [Trj] |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_90% (W) |