Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 25, 2021, 10:56 a.m. | Sept. 25, 2021, 11:10 a.m. |
-
a58df1031.exe "C:\Users\test22\AppData\Local\Temp\a58df1031.exe"
1468
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\besajo\zutinepu.pdb |
resource name | CUGAKADOZUYELOLOCORAVUYUVOSAFI |
resource name | HADEZAFELUZAGOXUCUXO |
name | CUGAKADOZUYELOLOCORAVUYUVOSAFI | language | LANG_SAAMI | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000e8708 | size | 0x00000685 | ||||||||||||||||||
name | HADEZAFELUZAGOXUCUXO | language | LANG_SAAMI | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000e8d90 | size | 0x00000636 | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000eadf0 | size | 0x00000230 | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000eadf0 | size | 0x00000230 | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000eadf0 | size | 0x00000230 | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000eadf0 | size | 0x00000230 | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000eadf0 | size | 0x00000230 | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000eadf0 | size | 0x00000230 | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000eadf0 | size | 0x00000230 | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000eadf0 | size | 0x00000230 | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000e9400 | size | 0x00000020 | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000e9400 | size | 0x00000020 |
section | {u'size_of_data': u'0x00057200', u'virtual_address': u'0x00001000', u'entropy': 7.974659101158085, u'name': u'.text', u'virtual_size': u'0x000571b0'} | entropy | 7.97465910116 | description | A section with a high entropy has been found | |||||||||
entropy | 0.869077306733 | description | Overall entropy of this PE file is high |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.436a9d01e4384a9b |
Malwarebytes | MachineLearning/Anomalous.100% |
Sangfor | Trojan.Win32.Save.a |
K7GW | Hacktool ( 700007861 ) |
Cybereason | malicious.a9409d |
BitDefenderTheta | Gen:NN.ZexaF.34170.zq0@aaCzcybO |
Cyren | W32/Kryptik.EWJ.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
Cynet | Malicious (score: 100) |
Kaspersky | VHO:Trojan-Downloader.Win32.Convagent.gen |
Sophos | ML/PE-A |
McAfee-GW-Edition | BehavesLike.Win32.Worm.gc |
SentinelOne | Static AI - Malicious PE |
Microsoft | Trojan:Win32/Glupteba.QW!MTB |
Acronis | suspicious |
McAfee | Packed-GDT!436A9D01E438 |
Cylance | Unsafe |
APEX | Malicious |
Rising | Malware.Obscure!1.A3BB (CLASSIC) |
MaxSecure | Trojan.Malware.300983.susgen |
CrowdStrike | win/malicious_confidence_100% (D) |