Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Jan. 24, 2022, 11:07 a.m. | Jan. 24, 2022, 11:10 a.m. |
-
182_1642770496_605.exe "C:\Users\test22\AppData\Local\Temp\182_1642770496_605.exe"
2864
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\cisas.pdb |
section | .womaje |
resource name | AFX_DIALOG_LAYOUT |
resource name | CIDAFICUDUROSOTAROM |
resource name | VESURAGOSAG |
resource name | YONAMIKORUFENI |
resource name | None |
name | CIDAFICUDUROSOTAROM | language | LANG_CHINESE | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00229bd0 | size | 0x000006c7 | ||||||||||||||||||
name | VESURAGOSAG | language | LANG_CHINESE | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002285f8 | size | 0x000006f0 | ||||||||||||||||||
name | YONAMIKORUFENI | language | LANG_CHINESE | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228ce8 | size | 0x00000ee8 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228130 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228130 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228130 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228130 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228130 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228130 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228130 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228130 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228130 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228130 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228130 | size | 0x00000468 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228598 | size | 0x0000005a | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00228598 | size | 0x0000005a |
section | {u'size_of_data': u'0x00067a00', u'virtual_address': u'0x00034000', u'entropy': 7.990587478345678, u'name': u'.data', u'virtual_size': u'0x001ecca8'} | entropy | 7.99058747835 | description | A section with a high entropy has been found | |||||||||
entropy | 0.612712490761 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetect.malware1 |
Lionic | Trojan.Win32.Zenpak.4!c |
Elastic | malicious (high confidence) |
DrWeb | Trojan.DownLoader44.35079 |
MicroWorld-eScan | Trojan.GenericKD.48042582 |
FireEye | Generic.mg.a5e1bd071692b98e |
McAfee | Packed-GEE!A5E1BD071692 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Riskware ( 0040eff71 ) |
K7GW | Riskware ( 0040eff71 ) |
Cybereason | malicious.dc1a13 |
Arcabit | Trojan.Generic.D2DD1256 |
Cyren | W32/Kryptik.GAL.gen!Eldorado |
Symantec | Trojan Horse |
ESET-NOD32 | a variant of Win32/Kryptik.HOBP |
TrendMicro-HouseCall | TROJ_FRS.0NA103AM22 |
Paloalto | generic.ml |
ClamAV | Win.Dropper.Mikey-9917324-0 |
Kaspersky | HEUR:Trojan-Spy.Win32.Stealer.gen |
BitDefender | Trojan.GenericKD.48042582 |
Avast | Win32:DropperX-gen [Drp] |
Ad-Aware | Trojan.GenericKD.48042582 |
Emsisoft | Trojan.GenericKD.48042582 (B) |
F-Secure | Trojan.TR/AD.StellarStealer.uqihw |
TrendMicro | TROJ_FRS.0NA103AM22 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.jc |
SentinelOne | Static AI - Malicious PE |
Sophos | Mal/Generic-S + Troj/Krypt-FV |
Ikarus | Trojan.Win32.Crypt |
Avira | TR/AD.StellarStealer.uqihw |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Gridinsoft | Trojan.Win32.Packed.ns |
Microsoft | Trojan:Win32/DllCheck.A!MSR |
GData | Win32.Trojan.BSE.11WL534 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Infostealer/Win.SmokeLoader.R467211 |
Acronis | suspicious |
ALYac | Trojan.GenericKD.48042582 |
Malwarebytes | Trojan.MalPack.GS |
APEX | Malicious |
Rising | Spyware.Stealer!8.3090 (CLOUD) |
MAX | malware (ai score=80) |
Fortinet | W32/Kryptik.HOBP!tr |
AVG | Win32:DropperX-gen [Drp] |
Panda | Trj/GdSda.A |
CrowdStrike | win/malicious_confidence_100% (W) |
MaxSecure | Trojan.Malware.300983.susgen |