Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 21, 2024, 1:36 p.m. | Oct. 21, 2024, 1:47 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
liveos.zapto.org | 194.26.192.138 |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
section | .gfids |
domain | liveos.zapto.org |
description | music.exe tried to sleep 126 seconds, actually delayed analysis time by 126 seconds |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU | reg_value | "C:\ProgramData\db\music.exe" | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU | reg_value | "C:\ProgramData\db\music.exe" | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Rmc-GHRUZU | reg_value | "C:\ProgramData\db\music.exe" | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU | reg_value | "C:\ProgramData\db\music.exe" | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU | reg_value | "C:\ProgramData\db\music.exe" | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Rmc-GHRUZU | reg_value | "C:\ProgramData\db\music.exe" |
process: potential process injection target | svchost.exe |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Remcos.m!c |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Backdoor.Remcos |
Skyhigh | BehavesLike.Win32.Remcos.gh |
ALYac | Generic.Remcos.F4F3D442 |
Cylance | Unsafe |
VIPRE | Generic.Remcos.F4F3D442 |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | Generic.Remcos.F4F3D442 |
K7GW | Trojan ( 0053ac2c1 ) |
K7AntiVirus | Trojan ( 0053ac2c1 ) |
Arcabit | Generic.Remcos.F4F3D442 |
Baidu | Win32.Trojan.Kryptik.awm |
VirIT | Trojan.Win32.Remcos.HCY |
Symantec | ML.Attribute.HighConfidence |
Elastic | Windows.Trojan.Remcos |
ESET-NOD32 | a variant of Win32/Rescoms.B |
APEX | Malicious |
Avast | Win32:RATX-gen [Trj] |
ClamAV | Win.Trojan.Remcos-9841897-0 |
Kaspersky | HEUR:Backdoor.Win32.Remcos.gen |
Alibaba | Backdoor:Win32/Remcos.2cfaafb7 |
NANO-Antivirus | Trojan.Win32.Rescoms.kqldxd |
SUPERAntiSpyware | Trojan.Agent/Gen-Crypt |
MicroWorld-eScan | Generic.Remcos.F4F3D442 |
Rising | Backdoor.Remcos!1.BAC7 (CLASSIC) |
Emsisoft | Generic.Remcos.F4F3D442 (B) |
F-Secure | Backdoor.BDS/Backdoor.Gen |
DrWeb | BackDoor.Remcos.438 |
Zillya | Trojan.Rescoms.Win32.1913 |
McAfeeD | Real Protect-LS!6520492A4E7F |
CTX | exe.trojan.remcos |
Sophos | Mal/Remcos-B |
SentinelOne | Static AI - Malicious PE |
FireEye | Generic.mg.6520492a4e7f9bc4 |
Jiangmin | Backdoor.Remcos.dzw |
Webroot | W32.Trojan.Remcos |
Detected | |
Avira | BDS/Backdoor.Gen |
Antiy-AVL | Trojan[Backdoor]/Win32.Rescoms.b |
Kingsoft | malware.kb.a.1000 |
Gridinsoft | Backdoor.Win32.Remcos.sa |
Xcitium | Malware@#20hc4yzez5yw7 |
Microsoft | Backdoor:Win32/Remcos.GA!MTB |
ViRobot | Trojan.Win.Z.Remcos.494080.DZ |
ZoneAlarm | HEUR:Backdoor.Win32.Remcos.gen |
GData | Generic.Remcos.F4F3D442 |
Varist | W32/Trojan.TEVC-5559 |