Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 26, 2025, 11:10 a.m. | March 26, 2025, 11:14 a.m. |
-
setup.exe "C:\Users\test22\AppData\Local\Temp\setup.exe"
1712
Name | Response | Post-Analysis Lookup |
---|---|---|
pub-c7b31ab9decd4a2684fcd9fc90862261.r2.dev | 162.159.140.237 | |
x1.i.lencr.org | 23.52.33.11 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49161 -> 172.66.0.235:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49161 172.66.0.235:443 |
C=US, O=Let's Encrypt, CN=R11 | CN=*.r2.dev | aa:79:da:cd:20:a6:72:e4:79:6f:4a:2a:74:7a:e5:95:5e:1c:21:4e |
pdb_path | C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb |
section | .didat |
section | .fptable |
request | GET http://x1.i.lencr.org/ |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob |
Lionic | Trojan.Win32.Generic.4!c |
CAT-QuickHeal | cld.trojan.fragtor |
ALYac | Gen:Variant.Zusy.587035 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Zusy.587035 |
BitDefender | Gen:Variant.Zusy.587035 |
Arcabit | Trojan.Zusy.D8F51B |
Symantec | Trojan Horse |
Avast | FileRepMalware [Misc] |
MicroWorld-eScan | Gen:Variant.Zusy.587035 |
Emsisoft | Gen:Variant.Zusy.587035 (B) |
McAfeeD | ti!39D6C2455CDF |
CTX | exe.trojan.fragtor |
FireEye | Gen:Variant.Zusy.587035 |
Webroot | Win.Trojan.Gen |
Detected | |
Antiy-AVL | Trojan/Win32.Agent |
GData | Gen:Variant.Zusy.587035 |
Varist | W32/ABTrojan.DJTS-2846 |
AhnLab-V3 | Malware/Win.Generic.C5743772 |
McAfee | Artemis!BAA233893561 |
DeepInstinct | MALICIOUS |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | TROJ_GEN.R014H09CM25 |
MaxSecure | Trojan.Malware.325361894.susgen |
Fortinet | W32/PossibleThreat |
AVG | FileRepMalware [Misc] |