Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 14, 2024, 10:37 a.m. | Oct. 14, 2024, 10:48 a.m. |
-
NewApp.exe "C:\Users\test22\AppData\Local\Temp\NewApp.exe"
2056
Name | Response | Post-Analysis Lookup |
---|---|---|
xmr-eu1.nanopool.org | 212.47.253.124 | |
pastebin.com | 104.20.4.235 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:50800 -> 164.124.101.2:53 | 2033268 | ET POLICY Observed DNS Query to Coin Mining Domain (nanopool .org) | Potential Corporate Privacy Violation |
TCP 192.168.56.103:49163 -> 104.20.3.235:443 | 906200068 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (CoinMiner) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.103:49164 163.172.154.142:10343 |
None | None | None |
TLS 1.3 192.168.56.103:49162 146.59.154.106:10343 |
None | None | None |
TLS 1.3 192.168.56.103:49163 104.20.3.235:443 |
None | None | None |
section | .00cfg |
section | .vmp\xec\x9b\x83\xec |
resource name | PNG |
section | {u'size_of_data': u'0x005b6c00', u'virtual_address': u'0x005b5000', u'entropy': 7.9802894410488445, u'name': u'.vmp\\xec\\x9b\\x83\\xec', u'virtual_size': u'0x005b6aa4'} | entropy | 7.98028944105 | description | A section with a high entropy has been found | |||||||||
entropy | 0.983113500798 | description | Overall entropy of this PE file is high |
section | .vmp\xec\x9b\x83\xec | description | Section name indicates VMProtect | ||||||
section | .vmp\xec\x9b\x83\xec | description | Section name indicates VMProtect | ||||||
section | .vmp\xec\x9b\x83\xec | description | Section name indicates VMProtect |
Lionic | Trojan.Win32.Nekark.4!c |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win64.Generic.tc |
ALYac | Application.Generic.3831465 |
Cylance | Unsafe |
VIPRE | Application.Generic.3831465 |
Sangfor | CoinMiner.Win64.Kryptik.V37i |
CrowdStrike | win/malicious_confidence_70% (D) |
BitDefender | Application.Generic.3831465 |
K7GW | Trojan ( 005b1af31 ) |
K7AntiVirus | Trojan ( 005b1af31 ) |
Arcabit | Application.Generic.D3A76A9 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win64/GenKryptik.GTSN |
APEX | Malicious |
Avast | Win64:MalwareX-gen [Trj] |
Kaspersky | UDS:Trojan.Win32.Miner.bfmkp |
Alibaba | Trojan:Win32/Miner.23238a54 |
NANO-Antivirus | Trojan.Win64.Nekark.ksqzsh |
MicroWorld-eScan | Application.Generic.3831465 |
Rising | Trojan.Reflo!8.1230F (TFE:5:4KEnqrPNWbT) |
Emsisoft | Application.Generic.3831465 (B) |
F-Secure | Trojan.TR/AD.Nekark.ofvqb |
DrWeb | Trojan.Siggen29.50366 |
McAfeeD | ti!E2CBF154467A |
CTX | exe.trojan.generic |
Sophos | Generic Reputation PUA (PUA) |
Ikarus | Trojan.Win64.Krypt |
FireEye | Generic.mg.6c5765152f972072 |
Detected | |
Avira | TR/AD.Nekark.ofvqb |
Antiy-AVL | Trojan/Win32.Caynamer |
Kingsoft | Win32.Trojan.Miner.bfmkp |
Gridinsoft | Trojan.Win64.CoinMiner.ca |
Microsoft | Trojan:Win64/Coinminer!rfn |
ViRobot | Trojan.Win.Z.Agent.6095360 |
ZoneAlarm | UDS:Trojan.Win32.Miner.bfmkp |
GData | Application.Generic.3831465 |
Varist | W64/ABRisk.KSAC-3935 |
AhnLab-V3 | Trojan/Win.Generic.R669480 |
McAfee | Artemis!6C5765152F97 |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.1514209829 |
Panda | Trj/Chgt.AD |
Tencent | Malware.Win32.Gencirc.141d5de0 |
Fortinet | W64/GenKryptik.GTSN!tr |
AVG | Win64:MalwareX-gen [Trj] |
Paloalto | generic.ml |
alibabacloud | Miner:Win/Caynamer.A9nj |