Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Jan. 30, 2023, 9:40 a.m. | Jan. 30, 2023, 9:47 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
154.39.255.235 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .asmc0 |
section | .asmc1 |
section | .asmc2 |
section | {u'size_of_data': u'0x0073c200', u'virtual_address': u'0x00801000', u'entropy': 7.964687933982133, u'name': u'.asmc2', u'virtual_size': u'0x0073c040'} | entropy | 7.96468793398 | description | A section with a high entropy has been found | |||||||||
entropy | 0.984452860275 | description | Overall entropy of this PE file is high |
host | 154.39.255.235 |
Bkav | W32.AIDetectNet.01 |
FireEye | Generic.mg.ab72029b00e74454 |
Cylance | Unsafe |
Cybereason | malicious.2739fd |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | UDS:HackTool.Win32.Krasnoglaz.ev |
NANO-Antivirus | Virus.Win32.Gen.ccmw |
Sophos | Generic ML PUA (PUA) |
SentinelOne | Static AI - Suspicious PE |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
VBA32 | BScope.TrojanPSW.RedLine |
Malwarebytes | Malware.Heuristic.1003 |
Rising | Trojan.Generic@AI.100 (RDML:4oz8U7lsE/+KvF1A04wlBw) |
BitDefenderTheta | Gen:NN.ZexaF.36212.@Z0@aq5vIPmO |