Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 17, 2023, 4:36 p.m. | July 17, 2023, 4:44 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\hecopihomo_weme\wul\rabanot-takobugegovec\gocaxewi-kivaticu.pdb |
name | RT_ICON | language | LANG_PORTUGUESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_PORTUGUESE_BRAZILIAN | offset | 0x001c3200 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_PORTUGUESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_PORTUGUESE_BRAZILIAN | offset | 0x001c3200 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_PORTUGUESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_PORTUGUESE_BRAZILIAN | offset | 0x001c3200 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_PORTUGUESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_PORTUGUESE_BRAZILIAN | offset | 0x001c3200 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_PORTUGUESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_PORTUGUESE_BRAZILIAN | offset | 0x001c3200 | size | 0x00000468 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_PORTUGUESE | filetype | data | sublanguage | SUBLANG_PORTUGUESE_BRAZILIAN | offset | 0x001c3668 | size | 0x0000004c |
section | {u'size_of_data': u'0x00040000', u'virtual_address': u'0x00001000', u'entropy': 7.880165748168907, u'name': u'.text', u'virtual_size': u'0x0003ffbe'} | entropy | 7.88016574817 | description | A section with a high entropy has been found | |||||||||
entropy | 0.823151125402 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Stealer.12!c |
MicroWorld-eScan | Gen:Variant.Zusy.477145 |
FireEye | Generic.mg.eabf49a55264bcc1 |
CAT-QuickHeal | Ransom.Stop.P5 |
McAfee | Artemis!EABF49A55264 |
Malwarebytes | Trojan.MalPack.GS |
VIPRE | Gen:Variant.Zusy.477145 |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 005690671 ) |
Alibaba | TrojanSpy:Win32/Stealer.471c9abd |
K7GW | Trojan ( 005690671 ) |
Cybereason | malicious.7f27f2 |
Arcabit | Trojan.Zusy.D747D9 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/GenKryptik.GLVV |
Cynet | Malicious (score: 100) |
APEX | Malicious |
ClamAV | Win.Packer.pkr_ce1a-9980177-0 |
Kaspersky | HEUR:Trojan-Spy.Win32.Stealer.gen |
BitDefender | Gen:Variant.Zusy.477145 |
Avast | Win32:CrypterX-gen [Trj] |
Tencent | Trojan.Win32.Obfuscated.gen |
Sophos | Mal/Generic-S |
F-Secure | Trojan.TR/Kryptik.qtjmj |
TrendMicro | TROJ_GEN.R002C0WGG23 |
McAfee-GW-Edition | BehavesLike.Win32.Lockbit.fc |
Emsisoft | Gen:Variant.Zusy.477145 (B) |
Ikarus | Trojan.Win32.Krypt |
Avira | TR/Kryptik.qtjmj |
Gridinsoft | Malware.Win32.RedLine.bot |
Microsoft | Trojan:Win32/Wacatac.B!ml |
ViRobot | Trojan.Win.Z.Jaik.319488 |
ZoneAlarm | HEUR:Trojan-Spy.Win32.Stealer.gen |
GData | Gen:Variant.Zusy.477145 |
Detected | |
AhnLab-V3 | Trojan/Win.Generic.C5455428 |
Acronis | suspicious |
ALYac | Gen:Variant.Jaik.155650 |
MAX | malware (ai score=84) |
Cylance | unsafe |
Panda | Trj/Genetic.gen |
TrendMicro-HouseCall | TROJ_GEN.R002C0WGG23 |
Rising | Trojan.Kryptik!1.B663 (CLASSIC) |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/GenKryptik.ERHN!tr |
AVG | Win32:CrypterX-gen [Trj] |
DeepInstinct | MALICIOUS |