Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | April 15, 2021, 3 p.m. | April 15, 2021, 3:03 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .gfids |
resource name | AFX_DIALOG_LAYOUT |
resource name | RT_RIBBON_XML |
section | {u'size_of_data': u'0x00015a00', u'virtual_address': u'0x00027000', u'entropy': 7.9225921885203885, u'name': u'.data', u'virtual_size': u'0x00016b60'} | entropy | 7.92259218852 | description | A section with a high entropy has been found | |||||||||
entropy | 0.35020242915 | description | Overall entropy of this PE file is high |
Elastic | malicious (high confidence) |
Cybereason | malicious.c2101c |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Avast | FileRepMetagen [Malware] |
Rising | Malware.Undefined!8.C (CLOUD) |
FireEye | Generic.mg.bb5ef523f0bf2437 |
Sophos | ML/PE-A |
Webroot | W32.Trojan.Gen |
AegisLab | Trojan.Win32.Dapato.b!c |
AVG | FileRepMetagen [Malware] |
CrowdStrike | win/malicious_confidence_90% (W) |