Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 8, 2025, 12:12 p.m. | March 8, 2025, 12:26 p.m. |
-
dressman.exe "C:\Users\test22\AppData\Local\Temp\dressman.exe"
1648 -
-
firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
2748
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Suricata Alerts
Suricata TLS
No Suricata TLS
request | POST http://www.iighpb.bid/5d1n/ |
request | GET http://www.iighpb.bid/5d1n/?HURm=jh47ZkWe3pMLesNqQxfZnWcYZ42BfePGwJQBvqmjJc844U6cN8Ak4K3ulvzfn6lddo6S72gjxf7EodEqFRvd5fa+7Ski0xAnnVoh+cas+na3D3OiP6NDxLmvcInSsfLuZB1qyXo=&Ns-H=ldGxzsoTk |
request | GET http://www.sqlite.org/2020/sqlite-dll-win32-x86-3320000.zip |
request | POST http://www.sbrqmu.info/i883/ |
request | GET http://www.sbrqmu.info/i883/?HURm=huU73JBtu3QyRUSva8mlc4VM62Ko0Xc2M3iXbmGsv5OJILTOM0eREVkX+jSCcFjglKBhrhOcOpoUYzGu15X9RjKkbHF88msUhX/mnpDKTKXKLLfW9eyFo/HeGZ1M8hO+4DNCATo=&Ns-H=ldGxzsoTk |
request | POST http://www.memelending.xyz/akvb/ |
request | GET http://www.memelending.xyz/akvb/?HURm=etUAwxxBsZH+778s54dWVVdYnxhpoHiG3WmQ7Xy2Jez6gkEbSSV1pnV2OkCedoCpOo91hQ5SDOX5jJoDXCCe3V8zXEVYkf5aO2mlGjtwmr2v3LCnrmqkVFJBk7wXFV2Y3Jrzzzg=&Ns-H=ldGxzsoTk |
request | POST http://www.ddvids.xyz/woo9/ |
request | GET http://www.ddvids.xyz/woo9/?HURm=Ctp2Csd8snwCAAuq+RhIGc8y73rjA79cYY9yf3pDFf9BGTycD8yIDUQcrIec3wCe/NdFl1LxRqJjhC0a3XbgS+5O7jounWyTbnXMDRi3is3s3Eh62gnvfSw2GphUSSZx+6/bYAk=&Ns-H=ldGxzsoTk |
request | POST http://www.topanked.top/0fhi/ |
request | GET http://www.topanked.top/0fhi/?HURm=cCXyyk4J5faVFTox+ER0RAjK1Z9ezHk0lrOwdAeOPfQPZof5UExjSf5+z32UEGUY2RvHxIeZh84xexKPhP2Wt9YWBTosPSkYAOuNjmbEy7eZW95sQnWGsLl87K/ZMBw5C9s6Sjc=&Ns-H=ldGxzsoTk |
request | POST http://www.ganjubaspepe.shop/xuh3/ |
request | GET http://www.ganjubaspepe.shop/xuh3/?HURm=IaEP9l0bvW2FY56Ja/vGWov3+eLbumgWWdgQ6YQDxSUuegQZjPsgg8yUWW0L3fr7l0MrDhbdM2OVgc0I1OJs7eJnFzzLLchM9iy+w2WbZhy1Q4TzF2nv9eEICoF+EmBgA1JBu4o=&Ns-H=ldGxzsoTk |
request | POST http://www.iighpb.bid/5d1n/ |
request | POST http://www.sbrqmu.info/i883/ |
request | POST http://www.memelending.xyz/akvb/ |
request | POST http://www.ddvids.xyz/woo9/ |
request | POST http://www.topanked.top/0fhi/ |
request | POST http://www.ganjubaspepe.shop/xuh3/ |
domain | www.topanked.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ |
file | C:\Users\test22\AppData\Local\Chromium\User Data |
file | C:\Users\test22\AppData\Local\MapleStudio\ChromePlus\User Data |
file | C:\Users\test22\AppData\Local\Yandex\YandexBrowser\User Data |
file | C:\Users\test22\AppData\Local\Temp\sqlite3.dll |
file | C:\Users\test22\AppData\Local\Temp\sqlite3.dll |
section | {u'size_of_data': u'0x00045800', u'virtual_address': u'0x00001000', u'entropy': 7.995983783793285, u'name': u'.text', u'virtual_size': u'0x000457f4'} | entropy | 7.99598378379 | description | A section with a high entropy has been found | |||||||||
entropy | 1.0 | description | Overall entropy of this PE file is high |
file | C:\Users\test22\AppData\Local\AVAST Software\Browser\User Data |
file | C:\Users\test22\AppData\Local\AVG\Browser\User Data |
Lionic | Trojan.Win32.Formbook.4!c |
tehtris | Generic.Malware |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.Ghanarava.174048384057a48b |
Skyhigh | BehavesLike.Win32.VirRansom.dc |
ALYac | Gen:Variant.Mikey.173310 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Mikey.173310 |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Gen:Variant.Mikey.173310 |
K7GW | Trojan ( 00536d121 ) |
K7AntiVirus | Trojan ( 00536d121 ) |
Arcabit | Trojan.Mikey.D2A4FE |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Formbook.AA |
APEX | Malicious |
Avast | Win32:MiscX-gen [PUP] |
Kaspersky | Trojan-Spy.Win32.Noon.bkpp |
Alibaba | Trojan:Win32/FormBook.26a4b89e |
MicroWorld-eScan | Gen:Variant.Mikey.173310 |
Rising | Trojan.Formbook!1.10495 (CLASSIC) |
Emsisoft | Gen:Variant.Mikey.173310 (B) |
F-Secure | Trojan.TR/Crypt.ZPACK.Gen |
Zillya | Trojan.Formbook.Win32.11345 |
McAfeeD | Real Protect-LS!3E4A1EEEA0B9 |
Trapmine | suspicious.low.ml.score |
CTX | exe.trojan.formbook |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
FireEye | Generic.mg.3e4a1eeea0b92fbe |
Detected | |
Avira | TR/Crypt.ZPACK.Gen |
Antiy-AVL | Trojan/Win32.Formbook.ak |
Kingsoft | malware.kb.a.1000 |
Gridinsoft | Ransom.Win32.Formbook.sa |
Microsoft | Trojan:Win32/FormBook.NF!MTB |
GData | Gen:Variant.Mikey.173310 |
Varist | W32/Formbook.AG.gen!Eldorado |
AhnLab-V3 | Infostealer/Win.Formbook.R647393 |
McAfee | Artemis!3E4A1EEEA0B9 |
DeepInstinct | MALICIOUS |
VBA32 | Virus.Goblin.2521 |
Malwarebytes | Malware.Heuristic.2051 |
Ikarus | Trojan.Win32.Formbook |
Panda | Trj/CI.A |
Tencent | Win32.Trojan.Crypt.Jajl |
huorong | TrojanSpy/Formbook.ah |
MaxSecure | Trojan.Malware.300983.susgen |