Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 9, 2021, 9:48 a.m. | Sept. 9, 2021, 9:52 a.m. |
-
sufile.exe "C:\Users\test22\AppData\Local\Temp\sufile.exe"
2416
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\vanehupete\duho51\jasikifi\zifuhimalo\pumojizagig.pdb |
resource name | FUFAMEDOWU |
resource name | MORELUFA |
section | {u'size_of_data': u'0x0001ca00', u'virtual_address': u'0x00001000', u'entropy': 7.585598179545185, u'name': u'.text', u'virtual_size': u'0x0001c9f2'} | entropy | 7.58559817955 | description | A section with a high entropy has been found | |||||||||
entropy | 0.681547619048 | description | Overall entropy of this PE file is high |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.f8a663ba086d5506 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7GW | Hacktool ( 700007861 ) |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefenderTheta | Gen:NN.ZexaF.34142.kq0@aeyV5PU |
Cyren | W32/Kryptik.EWJ.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
Rising | Trojan.Generic@ML.100 (RDML:ZTuTR9FmaItfDdpxRzkZLw) |
Sophos | ML/PE-A |
McAfee-GW-Edition | BehavesLike.Win32.Worm.cc |
eGambit | Unsafe.AI_Score_90% |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
Cynet | Malicious (score: 100) |
Acronis | suspicious |
Malwarebytes | Trojan.MalPack.GS |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
Cybereason | malicious.c18d66 |