Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Sept. 4, 2021, 1:54 p.m. | Sept. 4, 2021, 2:02 p.m. |
-
Real01_1.exe "C:\Users\test22\AppData\Local\Temp\Real01_1.exe"
1768
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\yewe\dific\zinucoyupar\hore53\deroliri_nipisoli_du.pdb |
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_KYRGYZ | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0018fd38 | size | 0x00000468 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_KYRGYZ | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x00189980 | size | 0x0000005a | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_KYRGYZ | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x00189980 | size | 0x0000005a |
section | {u'size_of_data': u'0x0007ba00', u'virtual_address': u'0x00027000', u'entropy': 7.988278934693907, u'name': u'.data', u'virtual_size': u'0x0015ec9c'} | entropy | 7.98827893469 | description | A section with a high entropy has been found | |||||||||
entropy | 0.714079422383 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Win32.Convagent.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Fragtor.13927 |
FireEye | Generic.mg.5cde4a5c2fad12bc |
ALYac | Gen:Variant.Fragtor.13927 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
Alibaba | Trojan:Win32/GenKryptik.93328895 |
Cyren | W32/Kryptik.EZJ.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Kryptik.HMHM |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Malware.Generic-9890017-0 |
Kaspersky | HEUR:Trojan.Win32.Chapak.gen |
BitDefender | Gen:Variant.Fragtor.13927 |
Avast | Win32:MalwareX-gen [Trj] |
Ad-Aware | Gen:Variant.Fragtor.13927 |
Sophos | Mal/Generic-S |
McAfee-GW-Edition | BehavesLike.Win32.Packed.jc |
Emsisoft | Gen:Variant.Fragtor.13927 (B) |
Ikarus | Trojan.Win32.Krypt |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Microsoft | Ransom:Win32/StopCrypt!ml |
GData | Gen:Variant.Fragtor.13927 |
Cynet | Malicious (score: 100) |
Acronis | suspicious |
McAfee | Artemis!5CDE4A5C2FAD |
MAX | malware (ai score=88) |
Malwarebytes | Malware.AI.3515296017 |
Rising | Malware.Obscure/Heur!1.A89F (CLASSIC) |
SentinelOne | Static AI - Malicious PE |
eGambit | Unsafe.AI_Score_74% |
Fortinet | W32/GenKryptik.FJVV!tr |
BitDefenderTheta | Gen:NN.ZexaF.34126.RqW@aenyiriG |
AVG | Win32:MalwareX-gen [Trj] |
Cybereason | malicious.7196db |
Panda | Trj/GdSda.A |
MaxSecure | Trojan.Malware.300983.susgen |