Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 14, 2024, 10:43 a.m. | Oct. 14, 2024, 10:46 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
bitbucket.org | 104.192.140.25 | |
pool.hashvault.pro | 131.153.76.130 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49170 -> 131.153.76.130:80 | 2024792 | ET POLICY Cryptocurrency Miner Checkin | Potential Corporate Privacy Violation |
TCP 192.168.56.101:49166 -> 104.192.140.26:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49167 -> 104.192.140.26:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
UDP 192.168.56.101:54148 -> 164.124.101.2:53 | 2036289 | ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) | Crypto Currency Mining Activity Detected |
TCP 192.168.56.101:49170 -> 131.153.76.130:80 | 2024792 | ET POLICY Cryptocurrency Miner Checkin | Potential Corporate Privacy Violation |
Suricata TLS
No Suricata TLS
pdb_path | D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb |
section | .didat |
resource name | PNG |
file | C:\Users\test22\AppData\Roaming\3.exe |
file | C:\Users\test22\AppData\Roaming\1.exe |
file | C:\Users\test22\AppData\Roaming\2.exe |
file | C:\Users\test22\AppData\Roaming\1.exe |
file | C:\Users\test22\AppData\Roaming\2.exe |
file | C:\Users\test22\AppData\Roaming\3.exe |
file | C:\Users\test22\AppData\Roaming\1.exe |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\NVIDIA Share | reg_value | C:\Users\test22\AppData\Roaming\ServiceAmd\3.exe |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Lumma.1u!c |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.Win64 |
Skyhigh | BehavesLike.Win32.CoinMiner.tc |
ALYac | Trojan.GenericKD.73953628 |
Cylance | Unsafe |
VIPRE | Trojan.GenericKD.73953628 |
Sangfor | Dropper.Win64.Agent.Vkid |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | Trojan.GenericKD.73953628 |
K7GW | Trojan ( 005b9d1a1 ) |
K7AntiVirus | Trojan ( 005b9d1a1 ) |
Arcabit | Trojan.Generic.D468715C |
VirIT | Trojan.Win32.Genus.WJC |
Symantec | Trojan.Gen.MBT |
Elastic | malicious (high confidence) |
ESET-NOD32 | multiple detections |
Avast | Win32:DropperX-gen [Drp] |
ClamAV | Win.Packed.Bladabindi-10017056-0 |
Kaspersky | Trojan.Win64.Miner.lrnj |
Alibaba | TrojanBanker:Win64/Miner.27b9c26e |
NANO-Antivirus | Trojan.Win64.Kryptik.kschut |
MicroWorld-eScan | Trojan.GenericKD.73953628 |
Rising | Trojan.Generic!8.C3 (CLOUD) |
Emsisoft | Trojan.GenericKD.73953628 (B) |
F-Secure | Trojan.TR/AVI.Lumma.bvoen |
DrWeb | Trojan.DownLoad4.16698 |
TrendMicro | TrojanSpy.Win32.LUMMASTEALER.YXEH2Z |
McAfeeD | ti!FA54BD6B0202 |
CTX | exe.trojan.lumma |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious SFX |
FireEye | Generic.mg.53427254779ab9b1 |
Webroot | Trojan.Dropper.Gen |
Detected | |
Avira | TR/AVI.Lumma.bvoen |
Antiy-AVL | Trojan[Banker]/Win32.ClipBanker |
Kingsoft | Win64.Trojan.Miner.lrnj |
Microsoft | Trojan:Win64/XMRig!pz |
ZoneAlarm | HEUR:Trojan-PSW.Win32.Lumma.gen |
GData | Trojan.GenericKD.73953628 |
Varist | W64/Injector.BMR.gen!Eldorado |
McAfee | Artemis!53427254779A |
DeepInstinct | MALICIOUS |
VBA32 | TrojanPSW.Lumma |
Malwarebytes | Crypt.Trojan.MSIL.DDS |
Ikarus | Trojan.Win64.Bladabindi |
Panda | Trj/Genetic.gen |
TrendMicro-HouseCall | TrojanSpy.Win32.LUMMASTEALER.YXEH2Z |