Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 16, 2024, 9:53 a.m. | June 16, 2024, 10:06 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
111.229.102.8 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
packer | Armadillo v1.71 |
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0000b448 | size | 0x00000128 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0000b448 | size | 0x00000128 | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0000b598 | size | 0x000001c6 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0000b570 | size | 0x00000022 |
file | C:\Program Files (x86)\Google\25261313.dll |
cmdline | cmd.exe /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\360setr.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\360setr.exe" |
file | C:\Users\test22\AppData\Local\Temp\360setr.exe |
cmdline | cmd.exe /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\360setr.exe" |
cmdline | "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\360setr.exe" |
cmdline | ping 127.0.0.1 -n 1 |
host | 111.229.102.8 |
service_name | Remoctds | service_path | C:\Users\test22\AppData\Local\Temp\%SystemRoot%\System32\svchost.exe -k "Remoctds" | ||||||
reg_key | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Remoctds\Parameters\ServiceDll | reg_value | C:\Program Files (x86)\Google\25261313.dll |
file | C:\Users\test22\AppData\Local\Temp\360setr.exe |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.YoungLotus.4!c |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Trojan.Younglotus.20397 |
ALYac | Dropped:Generic.Downloader.Nadrac.1.ACD8F610 |
Cylance | Unsafe |
VIPRE | Dropped:Generic.Downloader.Nadrac.1.ACD8F610 |
Sangfor | Backdoor.Win32.Farfli.Vd4m |
K7AntiVirus | Trojan ( 0055e3e41 ) |
K7GW | Trojan ( 0055e3e41 ) |
Cybereason | malicious.011930 |
VirIT | Backdoor.Win32.Generic.JUY |
Symantec | SMG.Heur!gen |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win32/Farfli.BGW |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Dropper.Gh0stRAT-7073897-1 |
Alibaba | Backdoor:Win32/YoungLotus.6c2814ca |
NANO-Antivirus | Trojan.Win32.YoungLotus.dpanmc |
SUPERAntiSpyware | Trojan.Agent/Gen-Zusy |
MicroWorld-eScan | Trojan.GenericKD.73138109 |
Emsisoft | Trojan.GenericKD.73138109 (B) |
F-Secure | Trojan.TR/AD.Farfli.qqkhu |
DrWeb | Trojan.DownLoader12.47777 |
McAfeeD | ti!ACEE72D64821 |
Trapmine | malicious.moderate.ml.score |
FireEye | Generic.mg.483fe860119307c2 |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Win32.Farfli |
Avira | TR/AD.Farfli.qqkhu |
MAX | malware (ai score=84) |
Antiy-AVL | Trojan/Win32.Farfli |
Kingsoft | Win32.Trojan.YoungLotus.t |
Gridinsoft | Trojan.Win32.Gen.tr |
Xcitium | TrojWare.Win32.YoungLotus.TCM@5ruomd |
Arcabit | Trojan.Generic.D45BFFBD |
ViRobot | Trojan.Win.Z.Younglotus.49152.E |
Microsoft | Backdoor:Win32/Venik!pz |
AhnLab-V3 | Trojan/Win32.Agent.R128989 |
BitDefenderTheta | Gen:NN.ZexaF.36806.dm0@aq6CFGjf |
Malwarebytes | Malware.AI.4194114185 |
Zoner | Trojan.Win32.97590 |
TrendMicro-HouseCall | BKDR_ZEGOST.SM29 |
Tencent | Malware.Win32.Gencirc.10b39405 |
Fortinet | W32/Farfli.BGW!tr |
Panda | Trj/Genetic.gen |
CrowdStrike | win/malicious_confidence_100% (W) |
alibabacloud | Backdoor:Win/Farfli |
dead_host | 192.168.56.101:49169 |
dead_host | 192.168.56.101:49166 |
dead_host | 192.168.56.101:49168 |
dead_host | 192.168.56.101:49165 |
dead_host | 192.168.56.101:49175 |
dead_host | 192.168.56.101:49174 |
dead_host | 111.229.102.8:8938 |
dead_host | 192.168.56.101:49173 |
dead_host | 192.168.56.101:49172 |