Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 17, 2024, 10:35 a.m. | Oct. 17, 2024, 10:58 a.m. |
-
AA_v3.exe "C:\Users\test22\AppData\Local\Temp\AA_v3.exe"
2544
Name | Response | Post-Analysis Lookup |
---|---|---|
rl.ammyy.com | 188.42.129.148 | |
www.ammyy.com | 136.243.18.118 | |
x1.i.lencr.org | 104.109.240.205 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49164 -> 188.42.129.148:80 | 2025149 | ET POLICY IP Check (rl. ammyy. com) | Potential Corporate Privacy Violation |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49168 136.243.18.118:443 |
C=US, O=Let's Encrypt, CN=R11 | CN=ammyy.com | d8:77:cf:85:fd:30:35:98:82:2f:43:3d:b0:d5:a1:57:3b:30:5e:04 |
packer | Armadillo v1.71 |
resource name | BINARY |
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST http://rl.ammyy.com/ | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ammyy.com/files/v8/aans64y2.gz |
request | POST http://rl.ammyy.com/ |
request | GET http://www.ammyy.com/files/v8/aans64y2.gz |
request | GET http://x1.i.lencr.org/ |
request | POST http://rl.ammyy.com/ |
host | 136.243.104.235 |
service_name | AmmyyAdmin_9F0 | service_path | C:\ProgramData\AMMYY\"C:\Users\test22\AppData\Local\Temp\AA_v3.exe" -service -lunch |