Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | April 13, 2025, 3:18 p.m. | April 13, 2025, 3:32 p.m. |
-
SQL.exe "C:\Users\test22\AppData\Local\Temp\SQL.exe"
2596
Name | Response | Post-Analysis Lookup |
---|---|---|
c.pki.goog |
CNAME
pki-goog.l.google.com
|
142.250.76.131 |
ip-api.com | 208.95.112.1 | |
api.ipify.org | 104.26.13.205 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2047702 | ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup | Misc activity |
TCP 192.168.56.101:49165 -> 172.67.74.152:443 | 2047703 | ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI | Misc activity |
TCP 192.168.56.101:49161 -> 45.227.252.199:7712 | 2061200 | ET MALWARE Aurotun Stealer CnC Checkin | A Network Trojan was detected |
UDP 192.168.56.101:53004 -> 164.124.101.2:53 | 2054141 | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) | Device Retrieving External IP Address Detected |
TCP 192.168.56.101:49169 -> 208.95.112.1:80 | 2022082 | ET POLICY External IP Lookup ip-api.com | Device Retrieving External IP Address Detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.101:49165 172.67.74.152:443 |
C=US, O=Google Trust Services, CN=WE1 | CN=ipify.org | bd:fd:0e:47:c4:8e:87:56:19:5e:86:99:5b:45:32:c3:13:aa:aa:f3 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
request | GET http://c.pki.goog/r/gsr1.crl |
request | GET http://c.pki.goog/r/r4.crl |
request | GET http://ip-api.com/json/121.133.128.1 |
request | GET https://api.ipify.org/ |
domain | api.ipify.org |
domain | ip-api.com |
host | 45.227.252.199 |
Lionic | Trojan.Win32.Lumma.1u!c |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Trojan.Ghanarava.1744484000f5500c |
Skyhigh | BehavesLike.Win64.Rootkit.wh |
ALYac | Gen:Variant.Lazy.669905 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Lazy.669905 |
BitDefender | Gen:Variant.Lazy.669905 |
K7GW | Spyware ( 005c2c001 ) |
K7AntiVirus | Spyware ( 005c2c001 ) |
Arcabit | Trojan.Lazy.DA38D1 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win64/Spy.Agent.NJ |
Avast | Win64:MalwareX-gen [Spy] |
Kaspersky | Trojan-PSW.Win32.Lumma.jxp |
Alibaba | TrojanSpy:Win64/MalwareX.9adbd97c |
MicroWorld-eScan | Gen:Variant.Lazy.669905 |
Rising | Spyware.Agent!8.C6 (TFE:5:l46WStEsZTT) |
Emsisoft | Gen:Variant.Lazy.669905 (B) |
F-Secure | Trojan.TR/Spy.Agent.kogty |
McAfeeD | ti!B869941A9C47 |
CTX | exe.trojan.lazy |
Sophos | Mal/Generic-S |
Webroot | Win.Trojan.Gen |
Detected | |
Avira | TR/Spy.Agent.kogty |
Microsoft | Trojan:Win32/Wacatac.B!ml |
GData | Gen:Variant.Lazy.669905 |
Varist | W64/ABSpyware.WVGK-7850 |
AhnLab-V3 | Trojan/Win.SpywareX-gen.R698117 |
McAfee | Artemis!EF0E5882C8BC |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.4190110976 |
Ikarus | Trojan.Win64.Spy |
Panda | Trj/Agent.RP |
TrendMicro-HouseCall | TROJ_GEN.R002H09DB25 |
Tencent | Win32.Trojan-QQPass.QQRob.Gplw |
huorong | Ransom/Filecoder.ax |
Fortinet | W64/Agent.NJ!tr.spy |
AVG | Win64:MalwareX-gen [Spy] |
alibabacloud | Trojan[spy]:Win/Lazy.Gen |