Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Sept. 27, 2021, 2:55 p.m. | Sept. 27, 2021, 3:01 p.m. |
-
34.exe "C:\Users\test22\AppData\Local\Temp\34.exe"
1428
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\romoj.pdb |
resource name | NABINIGEPUFELEHEKEZEZAFUFOGE |
name | NABINIGEPUFELEHEKEZEZAFUFOGE | language | LANG_SAAMI | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000efc40 | size | 0x00000685 | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000f1e50 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000f1e50 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000f1e50 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000f1e50 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000f1e50 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000f1e50 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000f1e50 | size | 0x000001fa | ||||||||||||||||||
name | RT_STRING | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000f1e50 | size | 0x000001fa | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000f02f0 | size | 0x00000020 | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_SAAMI | filetype | data | sublanguage | SUBLANG_ARABIC_LIBYA | offset | 0x000f02f0 | size | 0x00000020 |
section | {u'size_of_data': u'0x0005d600', u'virtual_address': u'0x00001000', u'entropy': 7.944004435651653, u'name': u'.text', u'virtual_size': u'0x0005d52c'} | entropy | 7.94400443565 | description | A section with a high entropy has been found | |||||||||
entropy | 0.864583333333 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Win32.Stealer.i!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.47024693 |
ALYac | Trojan.GenericKD.47024693 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Riskware ( 00584baa1 ) |
Alibaba | TrojanPSW:Win32/Racealer.c1d4c4a0 |
K7GW | Riskware ( 00584baa1 ) |
CrowdStrike | win/malicious_confidence_100% (W) |
Arcabit | Trojan.Generic.D2CD8A35 |
Cyren | W32/Kryptik.EWJ.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Kryptik.HMOV |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Packed.Fragtor-9896091-0 |
Kaspersky | HEUR:Trojan-PSW.Win32.Racealer.gen |
BitDefender | Trojan.GenericKD.47024693 |
Avast | Win32:Trojan-gen |
Rising | Trojan.Kryptik!1.D9B3 (CLASSIC) |
Ad-Aware | Trojan.GenericKD.47024693 |
Emsisoft | Trojan.Crypt (A) |
McAfee-GW-Edition | BehavesLike.Win32.Emotet.gc |
FireEye | Generic.mg.34b0ea9b7c806ff8 |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Win32.Crypt |
Jiangmin | Backdoor.Mokes.eny |
Avira | TR/AD.StellarStealer.oiyed |
Kingsoft | Win32.PSWTroj.Undef.(kcloud) |
Gridinsoft | Trojan.Win32.Packed.ns |
Microsoft | Trojan:Win32/Glupteba.QW!MTB |
ZoneAlarm | HEUR:Trojan-PSW.Win32.Racealer.gen |
GData | Trojan.GenericKD.47024693 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | CoinMiner/Win.Glupteba.R442508 |
Acronis | suspicious |
McAfee | Packed-GDT!34B0EA9B7C80 |
MAX | malware (ai score=83) |
VBA32 | BScope.Backdoor.MSIL.Agent |
Malwarebytes | Trojan.MalPack |
TrendMicro-HouseCall | TROJ_GEN.R06CH0CIN21 |
SentinelOne | Static AI - Malicious PE |
eGambit | Unsafe.AI_Score_97% |
Fortinet | W32/Packed.GDT!tr |
BitDefenderTheta | Gen:NN.ZexaF.34170.Bq0@aCz@YraO |
AVG | Win32:Trojan-gen |
Panda | Trj/GdSda.A |