Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Sept. 5, 2021, 4:41 p.m. | Sept. 5, 2021, 4:43 p.m. |
-
82550150ac3397ed391e34aa99d35be4.exe "C:\Users\test22\AppData\Local\Temp\82550150ac3397ed391e34aa99d35be4.exe"
1768
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\bofibevali-bofazenapi8.pdb |
resource name | JOCO |
resource name | NIXEFAMAMUSICETANEKOXOLUFUWA |
resource name | TORIVIWEBABAG |
section | {u'size_of_data': u'0x00449c00', u'virtual_address': u'0x00001000', u'entropy': 7.9994380328414545, u'name': u'.text', u'virtual_size': u'0x00449b60'} | entropy | 7.99943803284 | description | A section with a high entropy has been found | |||||||||
entropy | 0.967500275421 | description | Overall entropy of this PE file is high |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.6c0c5757834168ac |
Sangfor | Trojan.Win32.Save.a |
BitDefenderTheta | Gen:NN.ZexaF.34126.@t1@aGwL!Yic |
Cyren | W32/Kryptik.EWJ.gen!Eldorado |
APEX | Malicious |
Kaspersky | VHO:Backdoor.Win32.Androm.gen |
Ikarus | Trojan-Banker.UrSnif |
Cynet | Malicious (score: 100) |
Rising | Trojan.Generic@ML.80 (RDML:XZ+w3ofCsHPli7k86ESunQ) |
SentinelOne | Static AI - Suspicious PE |