Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 4, 2021, 6:13 p.m. | July 4, 2021, 6:16 p.m. |
-
file9.exe "C:\Users\test22\AppData\Local\Temp\file9.exe"
2332
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\rud\kuzino.pdb |
resource name | DAXEGAJOBAREHOKEZOPUKE |
resource name | NEVOM |
resource name | None |
name | DAXEGAJOBAREHOKEZOPUKE | language | LANG_SERBIAN | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_DEFAULT | offset | 0x001ebac0 | size | 0x00000685 | ||||||||||||||||||
name | NEVOM | language | LANG_SERBIAN | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_DEFAULT | offset | 0x001ec148 | size | 0x000008bd | ||||||||||||||||||
name | RT_ICON | language | LANG_SERBIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001eb618 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_SERBIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001eb618 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_SERBIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001eb618 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_SERBIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001eb618 | size | 0x00000468 | ||||||||||||||||||
name | RT_STRING | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x001ef340 | size | 0x000002ec | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x001eca30 | size | 0x00000008 | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x001eca30 | size | 0x00000008 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x001eba80 | size | 0x0000003e |
section | {u'size_of_data': u'0x00030200', u'virtual_address': u'0x00001000', u'entropy': 7.7578595049188985, u'name': u'.text', u'virtual_size': u'0x0003015c'} | entropy | 7.75785950492 | description | A section with a high entropy has been found | |||||||||
entropy | 0.668402777778 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetect.malware1 |
MicroWorld-eScan | Trojan.GenericKD.37178268 |
FireEye | Generic.mg.7fbd67a4066a92a1 |
McAfee | Packed-GDT!7FBD67A4066A |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 0056689f1 ) |
Alibaba | Trojan:Win32/Kryptik.2e64cdd4 |
K7GW | Trojan ( 0056689f1 ) |
Cybereason | malicious.c9980f |
Cyren | W32/Trojan.TBXT-4763 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Kryptik.HLOZ |
APEX | Malicious |
Avast | Win32:MalwareX-gen [Trj] |
Kaspersky | HEUR:Exploit.Win32.Shellcode.gen |
BitDefender | Trojan.GenericKD.37178268 |
Paloalto | generic.ml |
Ad-Aware | Trojan.GenericKD.37178268 |
Sophos | ML/PE-A + Troj/Kryptik-YY |
DrWeb | Trojan.PWS.Steam.19806 |
VIPRE | Trojan.Win32.Generic!BT |
TrendMicro | TROJ_GEN.R002C0DG221 |
McAfee-GW-Edition | BehavesLike.Win32.Trojan.dh |
Emsisoft | Trojan.Crypt (A) |
Ikarus | Trojan.Win32.Glupteba |
Webroot | W32.Trojan.Gen |
Microsoft | Trojan:Win32/Azorult.BL!MTB |
Gridinsoft | Trojan.Win32.Packed.lu!heur |
AegisLab | Trojan.Win32.Agent.4!c |
GData | Trojan.GenericKD.37178268 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.MalPE.R429162 |
Acronis | suspicious |
ALYac | Trojan.GenericKD.37178268 |
MAX | malware (ai score=86) |
VBA32 | Malware-Cryptor.InstallCore.6 |
Malwarebytes | Trojan.MalPack.GS |
TrendMicro-HouseCall | TROJ_GEN.R002C0DG221 |
Rising | Trojan.Kryptik!1.D7CF (CLASSIC) |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/GenKryptik.ERHN!tr |
AVG | Win32:MalwareX-gen [Trj] |
Panda | Trj/GdSda.A |
CrowdStrike | win/malicious_confidence_100% (W) |
Qihoo-360 | Win32/Trojan.Generic.HwoCVAQA |