Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 16, 2021, 10:01 a.m. | June 16, 2021, 10:03 a.m. |
-
-
rundll32.exe rundll32.exe
1396
-
-
explorer.exe C:\Windows\Explorer.EXE
1848
Name | Response | Post-Analysis Lookup |
---|---|---|
mail.namusoft.kr | 182.162.89.146 | |
www.jinjinpig.co.kr | 222.122.49.28 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .KDATA |
suspicious_features | POST method with no referer header | suspicious_request | POST http://www.jinjinpig.co.kr/Anyboard/skin/board.php | ||||||
suspicious_features | POST method with no referer header | suspicious_request | POST http://mail.namusoft.kr/jsp/user/eam/board.jsp |
request | POST http://www.jinjinpig.co.kr/Anyboard/skin/board.php |
request | POST http://mail.namusoft.kr/jsp/user/eam/board.jsp |
request | POST http://www.jinjinpig.co.kr/Anyboard/skin/board.php |
request | POST http://mail.namusoft.kr/jsp/user/eam/board.jsp |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Visor 2010 Launcher.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Visor 2010 Launcher.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Visor 2010 Launcher.lnk |
section | {u'size_of_data': u'0x00024a00', u'virtual_address': u'0x00026000', u'entropy': 7.482003278707654, u'name': u'.KDATA', u'virtual_size': u'0x00024814'} | entropy | 7.48200327871 | description | A section with a high entropy has been found | |||||||||
entropy | 0.547663551402 | description | Overall entropy of this PE file is high |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Visor 2010 Launcher.lnk |
DrWeb | Trojan.Siggen13.12633 |
CAT-QuickHeal | Trojan.Agent |
ALYac | Trojan.Agent.274944L |
Malwarebytes | Trojan.NukeSped |
VIPRE | Trojan.Win32.Generic!BT |
Sangfor | Trojan.Win32.Lazarus.IOC |
K7AntiVirus | Trojan ( 0057b8131 ) |
BitDefender | Gen:Variant.Razy.812381 |
K7GW | Trojan ( 0057b8131 ) |
Cybereason | malicious.9ca153 |
Cyren | W64/Trojan.AVEE-1962 |
Symantec | Trojan.Gen.2 |
ESET-NOD32 | a variant of Win64/NukeSped.HD |
APEX | Malicious |
Paloalto | generic.ml |
Cynet | Malicious (score: 100) |
Kaspersky | Trojan.Win32.Agent.xahodw |
Alibaba | Trojan:Win32/NukeSped.1ffadbc3 |
ViRobot | Trojan.Win64.S.Crat.274944 |
MicroWorld-eScan | Gen:Variant.Razy.812381 |
Avast | Win64:DropperX-gen [Drp] |
Ad-Aware | Gen:Variant.Razy.812381 |
Emsisoft | Gen:Variant.Razy.812381 (B) |
Comodo | Malware@#3ryquvlqv8obx |
Zillya | Trojan.Agent.Win32.2020613 |
TrendMicro | TROJ_FRS.0NA103DT21 |
McAfee-GW-Edition | BehavesLike.Win64.Generic.dc |
FireEye | Generic.mg.f4d46629ca15313b |
Sophos | Mal/Generic-S |
Avira | TR/NukeSped.fsmds |
MAX | malware (ai score=100) |
Antiy-AVL | Trojan/Generic.ASMalwS.32DB113 |
Gridinsoft | Trojan.Win64.Agent.oa |
Microsoft | Trojan:Win64/NukeSpeed.MK!MTB |
AegisLab | Trojan.Win32.Agent.4!c |
ZoneAlarm | Trojan.Win32.Agent.xahodw |
GData | Gen:Variant.Razy.812381 |
AhnLab-V3 | Trojan/Win.Akdoor.C4413289 |
McAfee | RDN/Generic Dropper |
VBA32 | Trojan.Agent |
Cylance | Unsafe |
TrendMicro-HouseCall | TROJ_FRS.0NA103DT21 |
Ikarus | Trojan.Win64.Nukesped |
MaxSecure | Trojan.Malware.117268387.susgen |
Fortinet | W64/NukeSped.HD!tr |
Webroot | W32.Trojan.Gen |
AVG | Win64:DropperX-gen [Drp] |
Panda | Trj/CI.A |
CrowdStrike | win/malicious_confidence_100% (W) |