Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 14, 2021, 8:59 a.m. | July 14, 2021, 9:25 a.m. |
-
339.exe "C:\Users\test22\AppData\Local\Temp\339.exe"
2452
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\yodig34\mumeru.pdb |
resource name | None |
name | RT_ICON | language | LANG_SERBIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x005df638 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_SERBIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x005df638 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_SERBIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x005df638 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_SERBIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x005df638 | size | 0x00000468 | ||||||||||||||||||
name | RT_STRING | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x005e1ec8 | size | 0x00000066 | ||||||||||||||||||
name | RT_STRING | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x005e1ec8 | size | 0x00000066 | ||||||||||||||||||
name | RT_STRING | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x005e1ec8 | size | 0x00000066 | ||||||||||||||||||
name | RT_STRING | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x005e1ec8 | size | 0x00000066 | ||||||||||||||||||
name | RT_STRING | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x005e1ec8 | size | 0x00000066 | ||||||||||||||||||
name | RT_STRING | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x005e1ec8 | size | 0x00000066 | ||||||||||||||||||
name | RT_STRING | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x005e1ec8 | size | 0x00000066 | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x005dfae0 | size | 0x00000028 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_SERBIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x005dfaa0 | size | 0x0000003e |
section | {u'size_of_data': u'0x0005c400', u'virtual_address': u'0x00001000', u'entropy': 7.947320279400454, u'name': u'.text', u'virtual_size': u'0x0005c218'} | entropy | 7.9473202794 | description | A section with a high entropy has been found | |||||||||
entropy | 0.896719319563 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetect.malware1 |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.a72bfb946650a4dc |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 0056f9be1 ) |
K7GW | Trojan ( 0056f9be1 ) |
Cybereason | malicious.360b70 |
Symantec | Packed.Generic.525 |
APEX | Malicious |
Sophos | ML/PE-A |
McAfee-GW-Edition | BehavesLike.Win32.Ransomware.gc |
Ikarus | Trojan-Dropper.Win32.Farfli |
Jiangmin | Backdoor.QBot.rr |
MaxSecure | Trojan.Malware.300983.susgen |
Microsoft | Trojan:Win32/Azorult.RT!MTB |
Cynet | Malicious (score: 100) |
Acronis | suspicious |
VBA32 | BScope.Backdoor.Androm |
Malwarebytes | Trojan.MalPack.GS |
Rising | Malware.Obscure!1.A3BB (CLASSIC) |
SentinelOne | Static AI - Malicious PE |
Fortinet | W32/GenKryptik.ERHN!tr |
CrowdStrike | win/malicious_confidence_100% (D) |
Qihoo-360 | HEUR/QVM10.1.9047.Malware.Gen |