Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Jan. 15, 2025, 12:20 p.m. | Jan. 15, 2025, 12:22 p.m. |
-
-
svchost.exe "C:\Users\test22\AppData\Local\Temp\stikontemplate2.1.exe"
2644
-
Name | Response | Post-Analysis Lookup |
---|---|---|
www.drstone1.click | ||
www.hafwje.bond | ||
www.imxtld.club | ||
www.7b5846.online | 172.67.188.70 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49164 -> 172.67.188.70:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.7b5846.online/hwu6/?yVMpQLaX=YeF1y3FHRZFVGQ1vWfJk7b1+zf3Y35LdyPySvknFh8W+fPSDaqGOdBA5NQ2HzgGxQ+01bUy7&1bz=o8rLp |
request | GET http://www.7b5846.online/hwu6/?yVMpQLaX=YeF1y3FHRZFVGQ1vWfJk7b1+zf3Y35LdyPySvknFh8W+fPSDaqGOdBA5NQ2HzgGxQ+01bUy7&1bz=o8rLp |
section | {u'size_of_data': u'0x000dea00', u'virtual_address': u'0x000d4000', u'entropy': 7.140434182874606, u'name': u'.rsrc', u'virtual_size': u'0x000de80c'} | entropy | 7.14043418287 | description | A section with a high entropy has been found | |||||||||
entropy | 0.509439359268 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win64.Injects.ts93 |
Cynet | Malicious (score: 99) |
Skyhigh | BehavesLike.Win32.Formbook.th |
McAfee | Artemis!00D95ADC7CA2 |
Cylance | Unsafe |
Sangfor | Virus.Win32.Save.a |
CrowdStrike | win/malicious_confidence_90% (W) |
BitDefender | Trojan.GenericKD.75375505 |
Arcabit | Trojan.Generic.D47E2391 |
Symantec | Trojan.Gen.MBT |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.Autoit.GTX |
APEX | Malicious |
Avast | Script:SNH-gen [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Alibaba | Trojan:Script/Generic.0fcf34b0 |
MicroWorld-eScan | Trojan.GenericKD.75375505 |
Emsisoft | Trojan.GenericKD.75375505 (B) |
F-Secure | Dropper.DR/AutoIt.Gen8 |
TrendMicro | Trojan.Win32.FORMBOOK.YXFANZ |
McAfeeD | Real Protect-LS!00D95ADC7CA2 |
CTX | exe.trojan.autoit |
Sophos | Mal/Generic-S |
FireEye | Generic.mg.00d95adc7ca2126d |
Detected | |
Avira | DR/AutoIt.Gen8 |
Kingsoft | Script.Trojan.Generic.a |
GData | Win32.Trojan-Stealer.FormBook.T7CLNO |
Varist | W32/Agent.DGKT-0333 |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Trojan.PatchedPE.DDS |
Ikarus | Trojan.Autoit |
TrendMicro-HouseCall | Trojan.Win32.FORMBOOK.YXFANZ |
Tencent | Script.Trojan.Generic.Rqil |
Fortinet | AutoIt/Injector.APO!tr |
AVG | Script:SNH-gen [Trj] |
Paloalto | generic.ml |