CoinMiner app.exe Malware IRC Backdoor Trojan Botnet PCAP File Download Traffic Analysis Sample

SHA256: 8d670eaeecbe0d8bc172560646b86d729b2c80b2f536cd2024a8ae502d89c805 File name: app.exe Detection ratio: 44 / 61 Analysis date: 2017-07-03 22:06:14 UTC ( 0 minutes ago )   Ikarus Trojan.MSIL.CoinMiner 20170703 K7AntiVirus Trojan ( 005104711 ) 20170703 K7GW Trojan ( 005104711 ) 20170703 Kaspersky Trojan.Win32.CoinMiner.qtq 20170703 Malwarebytes Backdoor.Bot 20170703 McAfee RDN/Generic.grp 20170703 McAfee-GW-Edition RDN/Generic.grp 20170703 Microsoft Trojan:Win32/Skeeyah.A!bit 20170703 eScan Gen:Variant.MSILPerseus.107893 20170703 NANO-Antivirus Trojan.Win32.CoinMiner.eqojuk 20170703 Palo Alto Networks (Known Signatures) generic.ml 20170703 Panda Trj/CI.A 20170703 Rising Trojan.CoinMiner!8.30A (cloud:bDpaAd9U5ZE) 20170703 SentinelOne (Static ML) static engine – malicious 20170516 Sophos Mal/Generic-S 20170703 Symantec Trojan.Gen.2 20170703 Tencent Win32.Trojan.Coinminer.Pegd 20170703 TrendMicro TROJ_GEN.R0E9C0PG317 20170703 TrendMicro-HouseCall TROJ_GEN.R0E9C0PG317 20170703 VIPRE Trojan.Win32.Generic!BT 20170703 https://virustotal.com/en/file/8d670eaeecbe0d8bc172560646b86d729b2c80b2f536cd2024a8ae502d89c805/analysis/1499119574/     […]

Possible Poweliks Variant Trojan Malware Adware Pay-per-Download Bitcoin Cryptocurrency PCAP file download traffic sample

  ESET-NOD32 NSIS/TrojanDownloader.Agent.NVZ 20170703 Fortinet W32/Agent.NVS!tr.dldr 20170629 Invincea heuristic 20170607 Kaspersky Trojan.Win32.Poweliks.adbd 20170703 McAfee Artemis!DD96CB7EFE6D 20170703 McAfee-GW-Edition BehavesLike.Win32.Vopak.kc 20170703 Microsoft Trojan:Win32/Starter.P 20170703 Palo Alto Networks (Known Signatures) generic.ml 20170703 Qihoo-360 Win32/Trojan.1e3 20170703 Rising Adware.ConvertAd!1.A1B5 (cloud:zJ49DXPzuCC) 20170703 SentinelOne (Static ML) static engine – malicious 20170516 Sophos Mal/Generic-S 20170703 Tencent Nsis.Trojan-downloader.Agent.Wuqw 20170703 TrendMicro-HouseCall Suspicious_GEN.F47V0703 20170703 VBA32 suspected of Trojan.Downloader.gen.h 20170630 VIPRE Trojan.Win32.Generic!BT 20170703 ZoneAlarm by Check Point Trojan.Win32.Poweliks.adbd 20170703   SHA256: f1877f0fd9bcaa4ee4498eb8f7c55cf2086313f2209caa18ef597898d2376e72 File name: lnk.php Detection ratio: 25 / 61 Analysis date: 2017-07-03 21:51:38 UTC ( 0 minutes ago )   https://virustotal.com/en/file/f1877f0fd9bcaa4ee4498eb8f7c55cf2086313f2209caa18ef597898d2376e72/analysis/1499118698/   2017-07-03 15:34:00.193162 IP 192.168.1.102.60285 > 198.50.183.24.80: Flags [P.], seq […]

Melonia.exe Loads Unknown Malware PUP Adware PCAP file download

2016-09-20 03:03:53.070426 IP 192.168.1.102.58496 > 192.168.1.100.80: Flags [P.], seq 1:340, ack 1, win 256, length 339: HTTP: GET /malware/melonia.exe HTTP/1.1 E..{e…..Og…f…d…P…. .M.P…….GET /malware/melonia.exe HTTP/1.1 Host: 192.168.1.100 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:47.0) Gecko/20100101 Firefox/47.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://192.168.1.100/malware/ Connection: keep-alive 2016-09-20 03:06:01.770587 IP 192.168.1.102.58520 > 177.158.22.159.80: Flags [P.], seq 0:161, ack 1, win 260, length 161: HTTP: GET /start.htm HTTP/1.1 E…%……B…f…….P.o…r.’P…^…GET /start.htm HTTP/1.1 Host: 177.158.22.159 Content-Length: 164 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:22.0) Gecko/20130328 Firefox/22.0 Please follow and like us:

Networking Random Sample of Network Packet Traffic PCAP file downloads

Networking Random Sample of Network Packet Traffic PCAP file downloads Please follow and like us:

Malware PUP Adware Evilprogram Traffic Sample PCAP file download

Malware PUP Adware Evilprogram Traffic Sample PCAP file download Please follow and like us: