Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Sept. 4, 2021, 1:54 p.m. | Sept. 4, 2021, 2:18 p.m. |
-
chrome.exe "C:\Users\test22\AppData\Local\Temp\chrome.exe"
2456
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\barezeweroni\yen\cajogaha9.pdb |
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x001a0898 | size | 0x00000468 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_KYRGYZ | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x001a1470 | size | 0x0000005a | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_KYRGYZ | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x001a1470 | size | 0x0000005a |
section | {u'size_of_data': u'0x00081c00', u'virtual_address': u'0x0002f000', u'entropy': 7.987514364714992, u'name': u'.data', u'virtual_size': u'0x00164db8'} | entropy | 7.98751436471 | description | A section with a high entropy has been found | |||||||||
entropy | 0.692 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Win32.Chapak.4!c |
Elastic | malicious (high confidence) |
DrWeb | Trojan.DownLoader41.54577 |
MicroWorld-eScan | Trojan.GenericKD.37518466 |
ALYac | Trojan.GenericKD.37518466 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_90% (W) |
Alibaba | Trojan:Win32/Kryptik.1c17a98d |
K7GW | Trojan ( 00581a8d1 ) |
K7AntiVirus | Trojan ( 00581a8d1 ) |
BitDefenderTheta | Gen:NN.ZexaF.34126.VqX@aumi!6eG |
Cyren | W32/Kryptik.EYC.gen!Eldorado |
ESET-NOD32 | a variant of Win32/Kryptik.HMHH |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Dropper.Raccoon-9889988-0 |
Kaspersky | HEUR:Trojan.Win32.Chapak.gen |
BitDefender | Trojan.GenericKD.37518466 |
NANO-Antivirus | Trojan.Win32.Kryptik.goydfx |
Avast | Win32:MalwareX-gen [Trj] |
Tencent | Win32.Trojan.Chapak.Ljag |
Ad-Aware | Trojan.GenericKD.37518466 |
Sophos | Mal/Generic-S + Troj/Krypt-BY |
McAfee-GW-Edition | BehavesLike.Win32.Emotet.bc |
FireEye | Generic.mg.30b21677cf7a267d |
Emsisoft | Trojan.GenericKD.37518466 (B) |
Ikarus | Trojan.Win32.Azorult |
GData | Trojan.GenericKD.37518466 |
Jiangmin | Trojan.Chapak.npo |
eGambit | Unsafe.AI_Score_99% |
Avira | HEUR/AGEN.1144410 |
Gridinsoft | Malware.Win32.GenericMC.cc |
Arcabit | Trojan.Generic.D23C7C82 |
Microsoft | Trojan:Win32/Racoon.L!MTB |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.MalPE.R439609 |
Acronis | suspicious |
McAfee | Packed-GDT!30B21677CF7A |
MAX | malware (ai score=83) |
VBA32 | Trojan.Sabsik.FL |
Malwarebytes | Trojan.MalPack.GS |
Rising | Malware.Obscure/Heur!1.A89F (CLASSIC) |
Yandex | Trojan.Chapak!D9gaZS6zew4 |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/GenKryptik.FJXI!tr |
Webroot | W32.Trojan.Gen |
AVG | Win32:MalwareX-gen [Trj] |