Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Nov. 18, 2021, 10:27 a.m. | Nov. 18, 2021, 10:27 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | {u'size_of_data': u'0x00033000', u'virtual_address': u'0x00001000', u'entropy': 7.609846308521365, u'name': u'.text', u'virtual_size': u'0x00032f04'} | entropy | 7.60984630852 | description | A section with a high entropy has been found | |||||||||
entropy | 0.811133200795 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetect.malware1 |
MicroWorld-eScan | Gen:Variant.Mikey.131421 |
McAfee | GenericRXAA-FA!BD63C91EBDE9 |
Malwarebytes | Malware.AI.1951074967 |
BitDefender | Gen:Variant.Mikey.131421 |
Arcabit | Trojan.Mikey.D2015D |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Ad-Aware | Gen:Variant.Mikey.131421 |
FireEye | Generic.mg.bd63c91ebde9fde1 |
Emsisoft | Gen:Variant.Mikey.131421 (B) |
Microsoft | Trojan:Win32/Emotetcrypt.GI!MTB |
GData | Gen:Variant.Mikey.131421 |
ALYac | Gen:Variant.Mikey.131421 |
MAX | malware (ai score=83) |