Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 9, 2023, 9:55 a.m. | March 9, 2023, 10:01 a.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Main
1972-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Main
2300
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,
2232 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Save
2140-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Save
2340
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | D:\Mktmp\Amadey\StealerDLL\x64\Release\STEALERDLL.pdb |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe |
section | _RDATA |
Lionic | Trojan.Win32.Convagent.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Mikey.143765 |
FireEye | Gen:Variant.Mikey.143765 |
CAT-QuickHeal | Trojanpws.Convagent |
McAfee | Artemis!7B4EBF09CF37 |
Sangfor | Infostealer.Win32.Agent.Vdyf |
K7AntiVirus | Password-Stealer ( 0059c99d1 ) |
Alibaba | TrojanPSW:Win64/Stealer.308a8ddc |
K7GW | Password-Stealer ( 0059c99d1 ) |
CrowdStrike | win/malicious_confidence_100% (W) |
Arcabit | Trojan.Mikey.D23195 |
VirIT | Trojan.Win64.Genus.LR |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Amadey.G |
Cynet | Malicious (score: 100) |
Paloalto | generic.ml |
ClamAV | Win.Malware.Zusy-9985435-0 |
Kaspersky | Trojan-PSW.Win64.Stealer.xr |
BitDefender | Gen:Variant.Mikey.143765 |
Avast | Win64:TrojanX-gen [Trj] |
Tencent | Malware.Win32.Gencirc.1185b932 |
Sophos | Troj/Steal-DCI |
F-Secure | Trojan.TR/PSW.Agent.fvghl |
VIPRE | Gen:Variant.Mikey.143765 |
McAfee-GW-Edition | BehavesLike.Win64.Dropper.th |
Emsisoft | Gen:Variant.Mikey.143765 (B) |
Avira | TR/PSW.Agent.fvghl |
Antiy-AVL | Trojan[PSW]/Win32.Stealer |
Gridinsoft | Ransom.Win64.Sabsik.cl |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
ViRobot | Trojan.Win.Z.Mikey.1088512.D |
ZoneAlarm | Trojan-PSW.Win64.Stealer.xr |
GData | Gen:Variant.Mikey.143765 |
Detected | |
AhnLab-V3 | Trojan/Win.Generic.C5288456 |
VBA32 | TrojanPSW.Convagent |
ALYac | Gen:Variant.Mikey.143765 |
MAX | malware (ai score=89) |
Malwarebytes | Spyware.PasswordStealer |
TrendMicro-HouseCall | TROJ_GEN.R002H0CC423 |
Rising | Stealer.Agent!8.C2 (TFE:5:8Idbp2vqW9I) |
Ikarus | Trojan-PSW.Agent |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W64/Agent.CW!tr.pws |
AVG | Win64:TrojanX-gen [Trj] |
Panda | Trj/Chgt.AD |