Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | April 6, 2023, 6:14 p.m. | April 6, 2023, 6:19 p.m. |
-
beeeb8705255d18dafdea0f550125dc5d321724db2ab7cbae19a04a953e404ed.exe "C:\Users\test22\AppData\Local\Temp\beeeb8705255d18dafdea0f550125dc5d321724db2ab7cbae19a04a953e404ed.exe"
2628-
beeeb8705255d18dafdea0f550125dc5d321724db2ab7cbae19a04a953e404ed.exe "C:\Users\test22\AppData\Local\Temp\beeeb8705255d18dafdea0f550125dc5d321724db2ab7cbae19a04a953e404ed.exe"
2772
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | _RDATA |
file | C:\Users\test22\AppData\Local\Temp\_MEI26282\libffi-7.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26282\pywin32_system32\pythoncom310.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26282\pywin32_system32\pywintypes310.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26282\sqlite3.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26282\mfc140u.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26282\python310.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26282\libcrypto-1_1.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26282\libssl-1_1.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26282\python3.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26282\VCRUNTIME140.dll |
section | {u'size_of_data': u'0x0000f600', u'virtual_address': u'0x00052000', u'entropy': 7.555572206814071, u'name': u'.rsrc', u'virtual_size': u'0x0000f498'} | entropy | 7.55557220681 | description | A section with a high entropy has been found |
Lionic | Trojan.Win32.Shelm.tseF |
DrWeb | Python.Stealer.737 |
MicroWorld-eScan | Trojan.GenericKD.66106791 |
FireEye | Trojan.GenericKD.66106791 |
CAT-QuickHeal | Trojanpws.Python |
ALYac | Trojan.GenericKD.66106791 |
Malwarebytes | Malware.AI.4266387664 |
VIPRE | Trojan.GenericKD.66106791 |
Alibaba | TrojanPSW:Win32/Disco.011f7ce5 |
CrowdStrike | win/malicious_confidence_90% (D) |
Arcabit | Trojan.Generic.D3F0B5A7 |
Cyren | W64/PY_Stealer.A.gen!Eldorado |
Symantec | Trojan.Gen.MBT |
Elastic | malicious (high confidence) |
ESET-NOD32 | multiple detections |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.GenericKD.66106791 |
Avast | Python:Agent-IR [Trj] |
Emsisoft | Trojan.GenericKD.66106791 (B) |
F-Secure | Heuristic.HEUR/AGEN.1358353 |
McAfee-GW-Edition | BehavesLike.Win64.Backdoor.tc |
Sophos | Mal/Generic-S |
Jiangmin | Trojan.Generic.horqm |
Avira | HEUR/AGEN.1358353 |
MAX | malware (ai score=82) |
Gridinsoft | Ransom.Win64.Sabsik.sa |
Microsoft | Trojan:Win32/Tiggre!rfn |
ZoneAlarm | HEUR:Trojan-PSW.Python.Disco.gen |
GData | Trojan.GenericKD.66106791 |
Cynet | Malicious (score: 99) |
McAfee | Artemis!24B23CC20BC7 |
Cylance | unsafe |
Panda | Trj/CI.A |
TrendMicro-HouseCall | TROJ_GEN.R002H0CCQ23 |
Tencent | Win64.Trojan-PSW.Disco.Qzfl |
Ikarus | Trojan-Spy.Python.TokenGrabber |
Fortinet | Python/Stealer.645!tr |
AVG | Python:Agent-IR [Trj] |
DeepInstinct | MALICIOUS |