Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Sept. 2, 2021, 10:08 a.m. | Sept. 2, 2021, 10:10 a.m. |
-
udptest.exe "C:\Users\test22\AppData\Local\Temp\udptest.exe"
876
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\paj9_dululepid77 sesomuk.pdb |
section | {u'size_of_data': u'0x00023400', u'virtual_address': u'0x00028000', u'entropy': 7.9113539593550755, u'name': u'.data', u'virtual_size': u'0x0272c028'} | entropy | 7.91135395936 | description | A section with a high entropy has been found | |||||||||
entropy | 0.450479233227 | description | Overall entropy of this PE file is high |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.0f7b6037afdc508b |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefenderTheta | Gen:NN.ZexaF.34126.tqW@aWANvoeG |
Cyren | W32/Kryptik.EYC.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Rising | Malware.Obscure/Heur!1.A89F (CLASSIC) |
McAfee-GW-Edition | BehavesLike.Win32.Generic.fc |
Sophos | ML/PE-A |
Ikarus | Trojan.Crypt |
Microsoft | Trojan:Win32/Racoon.L!MTB |
Cynet | Malicious (score: 100) |
Acronis | suspicious |
McAfee | Packed-GDT!0F7B6037AFDC |
SentinelOne | Static AI - Malicious PE |
Webroot | W32.Trojan.Gen |
Cybereason | malicious.9a9109 |