Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 24, 2021, 9 a.m. | Sept. 24, 2021, 9:05 a.m. |
-
vbc.exe "C:\Users\test22\AppData\Local\Temp\vbc.exe"
1468
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\juwuwonisi.pdb |
resource name | NABINIGEPUFELEHEKEZEZAFUFOGE |
resource name | WOVUWIZAWASEHIYOZEGEMOW |
name | NABINIGEPUFELEHEKEZEZAFUFOGE | language | LANG_SAAMI | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000aecc0 | size | 0x00000685 | ||||||||||||||||||
name | WOVUWIZAWASEHIYOZEGEMOW | language | LANG_SAAMI | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000af348 | size | 0x00000636 | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000b1508 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000b1508 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000b1508 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000b1508 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000b1508 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000b1508 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000b1508 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000b1508 | size | 0x000001fa | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000af9a8 | size | 0x00000020 | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000af9a8 | size | 0x00000020 |
section | {u'size_of_data': u'0x0001ce00', u'virtual_address': u'0x00001000', u'entropy': 7.596652454461633, u'name': u'.text', u'virtual_size': u'0x0001cc5c'} | entropy | 7.59665245446 | description | A section with a high entropy has been found | |||||||||
entropy | 0.65811965812 | description | Overall entropy of this PE file is high |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.44af6dd32a5f7d90 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7GW | Hacktool ( 700007861 ) |
Cybereason | malicious.861ee5 |
BitDefenderTheta | Gen:NN.ZexaF.34170.lq0@a058ongO |
Cyren | W32/Kryptik.EWJ.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Kryptik.HMOV |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Avast | FileRepMalware |
McAfee-GW-Edition | BehavesLike.Win32.Emotet.cc |
Sophos | Mal/Generic-S |
Jiangmin | Backdoor.Mokes.eny |
MaxSecure | Trojan.Malware.300983.susgen |
Microsoft | Trojan:Win32/Racealer.Q!MTB |
Cynet | Malicious (score: 100) |
Acronis | suspicious |
McAfee | Packed-GDT!44AF6DD32A5F |
VBA32 | BScope.Backdoor.MSIL.Agent |
Malwarebytes | MachineLearning/Anomalous.94% |
TrendMicro-HouseCall | TROJ_GEN.R06CH06IN21 |
SentinelOne | Static AI - Malicious PE |
eGambit | Unsafe.AI_Score_89% |
AVG | FileRepMalware |
CrowdStrike | win/malicious_confidence_100% (W) |