Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Sept. 9, 2021, 9 a.m. | Sept. 9, 2021, 9:13 a.m. |
-
vbc.exe "C:\Users\test22\AppData\Local\Temp\vbc.exe"
2040
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\wajiw robicinemuwoto16\dehav dibaxu\cexekejonuz_vayesa.pdb |
resource name | FUFAMEDOWU |
resource name | MORELUFA |
section | {u'size_of_data': u'0x0001d800', u'virtual_address': u'0x00001000', u'entropy': 7.597906248334912, u'name': u'.text', u'virtual_size': u'0x0001d772'} | entropy | 7.59790624833 | description | A section with a high entropy has been found | |||||||||
entropy | 0.686046511628 | description | Overall entropy of this PE file is high |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.c9ddf1bb09008b98 |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 0056ac331 ) |
K7GW | Trojan ( 0056ac331 ) |
Cybereason | malicious.c4c67a |
BitDefenderTheta | Gen:NN.ZexaF.34126.kq0@aip1j4G |
Cyren | W32/Kryptik.EWJ.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Avast | Win32:DropperX-gen [Drp] |
McAfee-GW-Edition | BehavesLike.Win32.Worm.cc |
Sophos | ML/PE-A |
SentinelOne | Static AI - Malicious PE |
Microsoft | Ransom:Win32/StopCrypt.MUK!MTB |
Cynet | Malicious (score: 100) |
AhnLab-V3 | CoinMiner/Win.Glupteba.R440555 |
Acronis | suspicious |
Cylance | Unsafe |
Rising | Trojan.Generic@ML.100 (RDML:JU7Zp/jefqKHHJKlMOkD2A) |
MaxSecure | Trojan.Malware.300983.susgen |
AVG | Win32:DropperX-gen [Drp] |
CrowdStrike | win/malicious_confidence_100% (D) |