Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Dec. 15, 2024, 5:28 p.m. | Dec. 15, 2024, 5:30 p.m. |
-
TPB-1.exe "C:\Users\test22\AppData\Local\Temp\TPB-1.exe"
1280
Name | Response | Post-Analysis Lookup |
---|---|---|
t.me | 149.154.167.99 | |
steamcommunity.com | 104.76.74.15 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49178 104.76.74.15:443 |
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA | unknown=US, unknown=Washington, unknown=Private Organization, serialNumber=602 290 773, C=US, ST=Washington, L=Bellevue, O=Valve Corp, CN=store.steampowered.com | 83:75:0b:54:d5:9e:34:40:6f:c2:2c:fc:be:5f:db:00:04:0d:d6:83 |
TLSv1 192.168.56.103:49171 104.76.74.15:443 |
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA | unknown=US, unknown=Washington, unknown=Private Organization, serialNumber=602 290 773, C=US, ST=Washington, L=Bellevue, O=Valve Corp, CN=store.steampowered.com | 83:75:0b:54:d5:9e:34:40:6f:c2:2c:fc:be:5f:db:00:04:0d:d6:83 |
TLSv1 192.168.56.103:49166 104.76.74.15:443 |
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA | unknown=US, unknown=Washington, unknown=Private Organization, serialNumber=602 290 773, C=US, ST=Washington, L=Bellevue, O=Valve Corp, CN=store.steampowered.com | 83:75:0b:54:d5:9e:34:40:6f:c2:2c:fc:be:5f:db:00:04:0d:d6:83 |
TLSv1 192.168.56.103:49188 104.76.74.15:443 |
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 Extended Validation Server CA | unknown=US, unknown=Washington, unknown=Private Organization, serialNumber=602 290 773, C=US, ST=Washington, L=Bellevue, O=Valve Corp, CN=store.steampowered.com | 83:75:0b:54:d5:9e:34:40:6f:c2:2c:fc:be:5f:db:00:04:0d:d6:83 |
section | .00cfg |
suspicious_features | GET method with no useragent header | suspicious_request | GET https://steamcommunity.com/profiles/76561199804377619 |
request | GET https://steamcommunity.com/profiles/76561199804377619 |
section | {u'size_of_data': u'0x0004a800', u'virtual_address': u'0x00001000', u'entropy': 6.86418826015134, u'name': u'.text', u'virtual_size': u'0x0004a7f4'} | entropy | 6.86418826015 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x0000f800', u'virtual_address': u'0x0004c000', u'entropy': 7.856089730506249, u'name': u'.rdata', u'virtual_size': u'0x0000f618'} | entropy | 7.85608973051 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x0000ee00', u'virtual_address': u'0x0005c000', u'entropy': 7.135286617410666, u'name': u'.data', u'virtual_size': u'0x00222144'} | entropy | 7.13528661741 | description | A section with a high entropy has been found | |||||||||
entropy | 0.904094827586 | description | Overall entropy of this PE file is high |
host | 37.27.43.98 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob |
process | TPB-1.exe | useragent | |||||||
process | TPB-1.exe | useragent | Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6 |
dead_host | 37.27.43.98:443 |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Vidar.4!c |
Cynet | Malicious (score: 100) |
CTX | exe.trojan.selfdel |
CAT-QuickHeal | Trojan.Selfdel |
Skyhigh | BehavesLike.Win32.Generic.gc |
ALYac | Gen:Variant.Lazy.627727 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Lazy.627727 |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
Alibaba | TrojanPSW:Win32/SelfDel.da338a29 |
K7GW | Riskware ( 00584baa1 ) |
K7AntiVirus | Riskware ( 00584baa1 ) |
VirIT | Trojan.Win32.GenusT.EDYQ |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/PSW.Agent.OGR |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Malware.Lazy-10038709-0 |
Kaspersky | Trojan.Win32.SelfDel.ivky |
BitDefender | Gen:Variant.Lazy.627727 |
NANO-Antivirus | Virus.Win32.Gen.ccmw |
MicroWorld-eScan | Gen:Variant.Lazy.627727 |
Rising | Stealer.Stealerc!8.17BE0 (TFE:3:AoJmJPuispO) |
Emsisoft | Gen:Variant.Lazy.627727 (B) |
F-Secure | Trojan.TR/PSW.Agent.bzhvf |
Zillya | Trojan.SelfDel.Win32.70563 |
McAfeeD | Real Protect-LS!760370C2AA28 |
Trapmine | malicious.high.ml.score |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
FireEye | Generic.mg.760370c2aa2829b5 |
Webroot | Win.Trojan.Gen |
Detected | |
Avira | TR/PSW.Agent.bzhvf |
Antiy-AVL | Trojan/Win32.SelfDel |
Kingsoft | Win32.HeurC.KVMH017.a |
Gridinsoft | Ransom.Win32.Wacatac.sa |
Arcabit | Trojan.Lazy.D9940F |
ViRobot | Trojan.Win.Z.Lazy.476160.A |
Microsoft | Trojan:Win32/Wacatac.B!ml |
AhnLab-V3 | Infostealer/Win.Vidar.R684336 |
McAfee | Artemis!760370C2AA28 |
DeepInstinct | MALICIOUS |
VBA32 | TrojanPSW.Vidar |
Malwarebytes | Trojan.Dropper |
Ikarus | Trojan-PSW.Agent |
Tencent | Malware.Win32.Gencirc.10c07d9c |