Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 19, 2021, 11:24 a.m. | Sept. 19, 2021, 11:28 a.m. |
-
xmrig.exe "C:\Users\test22\AppData\Local\Temp\xmrig.exe"
2548
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | \x00 |
section | .idata |
section | |
section | vjwaxffy |
section | utmkdsey |
section | .pdata\x00I |
section | {u'size_of_data': u'0x002c6800', u'virtual_address': u'0x00001000', u'entropy': 7.938686179088239, u'name': u' \\x00 ', u'virtual_size': u'0x00a1d000'} | entropy | 7.93868617909 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x002c9c00', u'virtual_address': u'0x00f08000', u'entropy': 7.962142895061056, u'name': u'vjwaxffy', u'virtual_size': u'0x002ca000'} | entropy | 7.96214289506 | description | A section with a high entropy has been found | |||||||||
entropy | 0.968795170479 | description | Overall entropy of this PE file is high |
registry | HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion |
registry | HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Razy.807972 |
FireEye | Generic.mg.4f5bbe6b657b6f58 |
McAfee | Artemis!4F5BBE6B657B |
Cylance | Unsafe |
Symantec | Trojan.Gen.2 |
ESET-NOD32 | a variant of Generik.NKEREYE potentially unwanted |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | Trojan.Win32.Miner.ayfld |
BitDefender | Gen:Variant.Razy.807972 |
Avast | Win64:Malware-gen |
Tencent | Win32.Trojan.Miner.Pfjv |
Ad-Aware | Gen:Variant.Razy.807972 |
Emsisoft | Gen:Variant.Razy.807972 (B) |
McAfee-GW-Edition | BehavesLike.Win64.Generic.tc |
Sophos | Generic PUA FI (PUA) |
Avira | TR/Miner.nopuk |
Gridinsoft | Trojan.Win64.CoinMiner.vb |
Microsoft | Trojan:Win32/Sehyioa.A!cl |
GData | Win32.Application.Coinminer.RV5QVZ |
Cynet | Malicious (score: 100) |
VBA32 | Trojan.Miner |
MAX | malware (ai score=80) |
Zoner | Probably Heur.ExeHeaderH |
TrendMicro-HouseCall | TROJ_GEN.R002H09IG21 |
SentinelOne | Static AI - Suspicious PE |
Fortinet | Riskware/Application |
Webroot | W32.Malware.Gen |
AVG | Win64:Malware-gen |
Cybereason | malicious.b657b6 |
Panda | Trj/CI.A |