Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 4, 2021, 4:21 p.m. | Oct. 4, 2021, 4:21 p.m. |
-
hofile.exe "C:\Users\test22\AppData\Local\Temp\hofile.exe"
2216
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\virox duzo.pdb |
resource name | BUJAHAGIRAMOMEVAXESAB |
resource name | YOCUSIDIHEBOSIZORIYEPASUGIHAXEDO |
resource name | None |
section | {u'size_of_data': u'0x00061e00', u'virtual_address': u'0x00001000', u'entropy': 7.909215143459372, u'name': u'.text', u'virtual_size': u'0x00061c40'} | entropy | 7.90921514346 | description | A section with a high entropy has been found | |||||||||
entropy | 0.724329324699 | description | Overall entropy of this PE file is high |
Elastic | malicious (high confidence) |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
Cyren | W32/Kryptik.EWJ.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Gen:Variant.Jaik.48277 |
McAfee-GW-Edition | BehavesLike.Win32.VirRansom.hc |
FireEye | Generic.mg.d111824423a23721 |
SentinelOne | Static AI - Malicious PE |
MAX | malware (ai score=82) |
Microsoft | Ransom:Win32/StopCrypt!ml |
Acronis | suspicious |
Malwarebytes | Trojan.MalPack.GS |
Rising | Trojan.Generic@ML.96 (RDML:KjZMPWNEFFcuZzZPIhjHew) |
Ikarus | Trojan.Crypt |
BitDefenderTheta | Gen:NN.ZexaF.34170.Hq0@aCxhExki |