Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | April 4, 2023, 5:10 p.m. | April 4, 2023, 5:12 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
192.253.237.20 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | 0\x00sp0 |
section | 1\x00sp1 |
section | 2\x00sp2 |
section | 3\x00ext |
section | 4\x00data |
section | 5\x00ata |
packer | MoleBox V2.3X -> MoleStudio.com |
name | RT_CURSOR | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00161f90 | size | 0x000000b4 | ||||||||||||||||||
name | RT_CURSOR | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00161f90 | size | 0x000000b4 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0016820c | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0016820c | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0016820c | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0016820c | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0016820c | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0016820c | size | 0x00000144 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0016dd34 | size | 0x00000128 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0016dd34 | size | 0x00000128 | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001686f4 | size | 0x000000e2 | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001686f4 | size | 0x000000e2 | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001686f4 | size | 0x000000e2 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690d4 | size | 0x00000024 | ||||||||||||||||||
name | RT_GROUP_CURSOR | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x001690f8 | size | 0x00000022 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0016d610 | size | 0x00000022 | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0016d634 | size | 0x00000418 |
cmdline | C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\test22\AppData\Local\Temp\0002.exe > nul |
file | C:\Users\test22\AppData\Local\Temp\0002.exe |
section | {u'size_of_data': u'0x00084200', u'virtual_address': u'0x0016d000', u'entropy': 7.9956980613884685, u'name': u'1\\x00sp1', u'virtual_size': u'0x00085000'} | entropy | 7.99569806139 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x0000b800', u'virtual_address': u'0x001f3000', u'entropy': 7.897586156877972, u'name': u'3\\x00ext', u'virtual_size': u'0x00011daf'} | entropy | 7.89758615688 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00001c00', u'virtual_address': u'0x00206000', u'entropy': 7.977916949474003, u'name': u'5\\x00ata', u'virtual_size': u'0x00007198'} | entropy | 7.97791694947 | description | A section with a high entropy has been found | |||||||||
entropy | 0.994017094017 | description | Overall entropy of this PE file is high |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | ping -n 2 127.0.0.1 |
cmdline | C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\test22\AppData\Local\Temp\0002.exe > nul |
host | 192.253.237.20 |
service_name | Phiyab Tumno | service_path | C:\Windows\System32\Deuvn.exe -auto |
file | C:\Users\test22\AppData\Local\Temp\0002.exe |
Lionic | Trojan.Win32.Magania.4!c |
tehtris | Generic.Malware |
DrWeb | BackDoor.Farfli.131 |
MicroWorld-eScan | DeepScan:Generic.KillMBR.A.85BE6D5D |
FireEye | Generic.mg.245ef358e384f40c |
McAfee | Artemis!245EF358E384 |
Cylance | unsafe |
Zillya | Trojan.Magania.Win32.74783 |
Sangfor | Trojan.Win32.Agent.An34 |
K7AntiVirus | Riskware ( 00584baa1 ) |
Alibaba | Backdoor:Win32/Zegost.db114489 |
K7GW | Riskware ( 00584baa1 ) |
CrowdStrike | win/malicious_confidence_100% (W) |
Arcabit | DeepScan:Generic.KillMBR.A.85BE6D5D |
BitDefenderTheta | Gen:NN.ZexaF.36132.mzxaaWwAKpab |
VirIT | Trojan.Win32.Genus.ODZ |
Cyren | W32/S-68bad4f1!Eldorado |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Generik.NVMRNID |
Cynet | Malicious (score: 100) |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | DeepScan:Generic.KillMBR.A.85BE6D5D |
Avast | Win32:BackdoorX-gen [Trj] |
Tencent | Malware.Win32.Gencirc.1187ee35 |
Emsisoft | DeepScan:Generic.KillMBR.A.85BE6D5D (B) |
F-Secure | Trojan.TR/Crypt.XPACK.Gen2 |
VIPRE | DeepScan:Generic.KillMBR.A.85BE6D5D |
TrendMicro | TROJ_GEN.R002C0DCU23 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.tc |
Trapmine | malicious.high.ml.score |
Sophos | Troj/Farfli-DW |
Ikarus | Trojan.Crypt |
Avira | TR/Crypt.XPACK.Gen2 |
Gridinsoft | Pack.Win32.Gen.bot!ep-45894 |
Xcitium | Backdoor.Win32.Popwin.~IQ@ogvrk |
Microsoft | Backdoor:Win32/Zegost.KM!MTB |
ViRobot | Trojan.Win.Z.Killmbr.1245747 |
ZoneAlarm | VHO:Trojan-GameThief.Win32.Magania.gen |
GData | DeepScan:Generic.KillMBR.A.85BE6D5D |
Detected | |
AhnLab-V3 | Backdoor/Win.Farfli.C5393627 |
VBA32 | BScope.Backdoor.Farfli |
ALYac | DeepScan:Generic.KillMBR.A.85BE6D5D |
MAX | malware (ai score=82) |
Malwarebytes | Backdoor.GhostRat |
Panda | Trj/Genetic.gen |
TrendMicro-HouseCall | TROJ_GEN.R002C0DCU23 |
Rising | Backdoor.Gh0st!1.DF86 (CLOUD) |