Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 15, 2023, 12:04 p.m. | March 15, 2023, 12:07 p.m. |
-
s.exe "C:\Users\test22\AppData\Local\Temp\s.exe"
2564
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
resource name | COCUSONO |
resource name | None |
section | {u'size_of_data': u'0x00013400', u'virtual_address': u'0x0000d000', u'entropy': 7.858122732338592, u'name': u'.data', u'virtual_size': u'0x00090984'} | entropy | 7.85812273234 | description | A section with a high entropy has been found | |||||||||
entropy | 0.412868632708 | description | Overall entropy of this PE file is high |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Avast | CrypterX-gen [Trj] |
Sophos | ML/PE-A |
McAfee-GW-Edition | BehavesLike.Win32.Lockbit.ch |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.5aed2df2d2d32d11 |
SentinelOne | Static AI - Suspicious PE |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
Detected | |
MAX | malware (ai score=81) |
Cylance | unsafe |
Rising | Trojan.Generic@AI.100 (RDML:DjSjwEWEyPcLzmxDQ1MwsQ) |
Ikarus | Trojan.Win32.Crypt |
MaxSecure | Trojan.Malware.300983.susgen |
AVG | CrypterX-gen [Trj] |