Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Nov. 4, 2021, 3:23 p.m. | Nov. 4, 2021, 3:27 p.m. |
-
pub33.exe "C:\Users\test22\AppData\Local\Temp\pub33.exe"
2372
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 185.215.113.77:80 -> 192.168.56.103:49170 | 2400024 | ET DROP Spamhaus DROP Listed Traffic Inbound group 25 | Misc Attack |
Suricata TLS
No Suricata TLS
pdb_path | C:\zotepuxamiyezi\4\ziw55 sin\moriveh65-mun50.pdb |
section | .wupifa |
resource name | AFX_DIALOG_LAYOUT |
resource name | None |
name | RT_ICON | language | LANG_LATVIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0002c1e0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_LATVIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0002c1e0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_LATVIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0002c1e0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_LATVIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0002c1e0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_LATVIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0002c1e0 | size | 0x00000468 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_LATVIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x0002c648 | size | 0x0000004c |
section | {u'size_of_data': u'0x00015a00', u'virtual_address': u'0x00001000', u'entropy': 7.398043185723663, u'name': u'.text', u'virtual_size': u'0x00015970'} | entropy | 7.39804318572 | description | A section with a high entropy has been found | |||||||||
entropy | 0.631386861314 | description | Overall entropy of this PE file is high |
host | 185.215.113.77 |
Bkav | W32.AIDetect.malware1 |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.cafd9451b6821b63 |
McAfee | Packed-GDV!CAFD9451B682 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7GW | Hacktool ( 700007861 ) |
Cybereason | malicious.575050 |
BitDefenderTheta | Gen:NN.ZexaF.34236.iu0@ai06uNoI |
Cyren | W32/Kryptik.FOQ.gen!Eldorado |
Symantec | Packed.Generic.528 |
APEX | Malicious |
Kaspersky | VHO:Trojan.Win32.Injuke.gen |
McAfee-GW-Edition | BehavesLike.Win32.Lockbit.ch |
Emsisoft | Trojan.Crypt (A) |
Ikarus | Trojan.Win32.Crypt |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
Cynet | Malicious (score: 100) |
Acronis | suspicious |
VBA32 | suspected of Malware-Cryptor.Trac |
Malwarebytes | Trojan.MalPack.GS |
Rising | Malware.Heuristic!ET#95% (RDMK:cmRtazqWzNHx1cG04B2gGEOR/1pU) |
SentinelOne | Static AI - Malicious PE |
eGambit | Unsafe.AI_Score_99% |
CrowdStrike | win/malicious_confidence_100% (D) |
MaxSecure | Trojan.Malware.300983.susgen |