Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Sept. 30, 2021, 9:13 a.m. | Sept. 30, 2021, 9:15 a.m. |
-
28347623.jpg "C:\Users\test22\AppData\Local\Temp\28347623.jpg"
1328
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\farozisun2\vovon kemexijaduhibu61\f.pdb |
resource name | AFX_DIALOG_LAYOUT |
resource name | PAMIFEGIHURULUFUKIYUVUWOGULOJOK |
resource name | None |
name | AFX_DIALOG_LAYOUT | language | LANG_MONGOLIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x027bdfe8 | size | 0x00000002 | ||||||||||||||||||
name | PAMIFEGIHURULUFUKIYUVUWOGULOJOK | language | LANG_MONGOLIAN | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_DEFAULT | offset | 0x027bd860 | size | 0x000006f0 | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_MONGOLIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x027bdf50 | size | 0x00000078 | ||||||||||||||||||
name | RT_VERSION | language | LANG_MONGOLIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x027bdff0 | size | 0x00000130 | ||||||||||||||||||
name | None | language | LANG_MONGOLIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x027bdfd8 | size | 0x0000000a | ||||||||||||||||||
name | None | language | LANG_MONGOLIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x027bdfd8 | size | 0x0000000a |
section | {u'size_of_data': u'0x00050a00', u'virtual_address': u'0x00025000', u'entropy': 7.976465953996447, u'name': u'.data', u'virtual_size': u'0x02795a44'} | entropy | 7.976465954 | description | A section with a high entropy has been found | |||||||||
entropy | 0.595567867036 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetect.malware1 |
Lionic | Trojan.Win32.Malicious.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Fragtor.26727 |
CAT-QuickHeal | Ransom.Stop.Z5 |
ALYac | Gen:Variant.Ulise.303597 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
Alibaba | Trojan:Win32/Raccrypt.2748e9b6 |
K7GW | Trojan ( 005882c11 ) |
K7AntiVirus | Trojan ( 005882c11 ) |
Arcabit | Trojan.Fragtor.D6867 |
BitDefenderTheta | Gen:NN.ZexaF.34170.HuW@a0pxuqfO |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Kryptik.HMQN |
APEX | Malicious |
Paloalto | generic.ml |
Cynet | Malicious (score: 100) |
Kaspersky | HEUR:Trojan-Ransom.Win32.Stop.gen |
BitDefender | Gen:Variant.Fragtor.26727 |
Rising | Trojan.Generic@ML.91 (RDML:CVHK5ZzLoyfxIuJ4KNE87g) |
Ad-Aware | Gen:Variant.Fragtor.26727 |
Emsisoft | Gen:Variant.Fragtor.26727 (B) |
DrWeb | Trojan.DownLoader42.62977 |
FireEye | Generic.mg.481bd2e89355de9a |
Sophos | Mal/Generic-S |
Microsoft | Trojan:Win32/Raccrypt.GY!MTB |
ZoneAlarm | HEUR:Trojan-Ransom.Win32.Stop.gen |
GData | Gen:Variant.Fragtor.26727 |
Acronis | suspicious |
VBA32 | Malware-Cryptor.Azorult.gen |
MAX | malware (ai score=85) |
Malwarebytes | Trojan.MalPack |
Panda | Trj/GdSda.A |
TrendMicro-HouseCall | TROJ_GEN.R002C0PIS21 |
Tencent | Win32.Trojan.Agent.Pbfn |
SentinelOne | Static AI - Malicious PE |
eGambit | Unsafe.AI_Score_93% |
Fortinet | W32/GenKryptik.FLGE!tr |
AVG | FileRepMalware |
Avast | FileRepMalware |