Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Nov. 13, 2021, 11:11 a.m. | Nov. 13, 2021, 11:18 a.m. |
-
sefile.exe "C:\Users\test22\AppData\Local\Temp\sefile.exe"
2328
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\hij\jusujodewexegu-dimi.pdb |
section | {u'size_of_data': u'0x00056a00', u'virtual_address': u'0x00001000', u'entropy': 7.440753313486823, u'name': u'.text', u'virtual_size': u'0x00056966'} | entropy | 7.44075331349 | description | A section with a high entropy has been found | |||||||||
entropy | 0.77 | description | Overall entropy of this PE file is high |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.e05a1928cd4ad6e8 |
Cylance | Unsafe |
Cybereason | malicious.bea988 |
Cyren | W32/Kryptik.FSC.gen!Eldorado |
Symantec | Packed.Generic.620 |
Kaspersky | UDS:Trojan-Spy.Win32.Stealer.gen |
Sophos | ML/PE-A + Troj/Krypt-DY |
Baidu | Win32.Trojan.Kryptik.jm |
Ikarus | Trojan.Win32.Azorult |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
Cynet | Malicious (score: 100) |
Acronis | suspicious |
Malwarebytes | Trojan.MalPack.GS |
APEX | Malicious |
Rising | Malware.Heuristic!ET#90% (RDMK:cmRtazppjpupT5vzmNCPwr2BvvYN) |
SentinelOne | Static AI - Malicious PE |
eGambit | Unsafe.AI_Score_96% |
CrowdStrike | win/malicious_confidence_80% (D) |
MaxSecure | Trojan.Malware.300983.susgen |