Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 2, 2021, 11:38 a.m. | Nov. 2, 2021, 11:44 a.m. |
-
AAAA.exe "C:\Users\test22\AppData\Local\Temp\AAAA.exe"
2772
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
182.162.106.104 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .itext |
section | .didata |
name | RT_ICON | language | LANG_KOREAN | filetype | data | sublanguage | SUBLANG_KOREAN | offset | 0x0018650c | size | 0x00000ea8 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_KOREAN | filetype | data | sublanguage | SUBLANG_KOREAN | offset | 0x001952cc | size | 0x00000014 | ||||||||||||||||||
name | RT_MANIFEST | language | LANG_KOREAN | filetype | XML 1.0 document, ASCII text, with CRLF line terminators | sublanguage | SUBLANG_KOREAN | offset | 0x001952e0 | size | 0x00000244 |
host | 182.162.106.104 |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.353bbe59184e2235 |
Cylance | Unsafe |
Sangfor | Virus.Win32.Save.a |
K7AntiVirus | Trojan ( 7000000f1 ) |
K7GW | Trojan ( 7000000f1 ) |
BitDefenderTheta | Gen:NN.ZelphiF.34236.IPW@aC7JA@dO |
ESET-NOD32 | a variant of Win32/Urelas.BF |
Ikarus | Hoax.Win32.ArchSMS |
Avira | TR/Crypt.XPACK.Gen8 |
Cynet | Malicious (score: 99) |
VBA32 | TScope.Trojan.Delf |
Malwarebytes | MachineLearning/Anomalous.100% |
Rising | Malware.Heuristic!ET#81% (RDMK:cmRtazrNSf5uBJB4GPVqpnKebXtL) |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Urelas.BF!tr |
Cybereason | malicious.99fd27 |