Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Dec. 14, 2023, 6:49 p.m. | Dec. 14, 2023, 6:58 p.m. |
-
zil5.exe "C:\Users\test22\AppData\Local\Temp\zil5.exe"
2560
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
113.52.134.114 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | {u'size_of_data': u'0x0001c600', u'virtual_address': u'0x000b1000', u'entropy': 7.6308139641714945, u'name': u'.data', u'virtual_size': u'0x0001c5d0'} | entropy | 7.63081396417 | description | A section with a high entropy has been found |
host | 113.52.134.114 |
Bkav | W64.AIDetectMalware |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
Sangfor | Backdoor.Win32.Havoc.Vr7h |
Cybereason | malicious.e7dbc3 |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
Kaspersky | Backdoor.Win64.Havoc.bmv |
Rising | Backdoor.Havoc!8.970A (TFE:5:FmKscZQWeQD) |
FireEye | Generic.mg.448c002a1a5246c0 |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Win64.Shellcoderunner |
Detected | |
Antiy-AVL | Trojan[Backdoor]/Win64.Havoc |
Microsoft | Trojan:Win32/ScarletFlash.A |
ZoneAlarm | Backdoor.Win64.Havoc.bmv |
DeepInstinct | MALICIOUS |
Panda | Trj/Chgt.AD |
SentinelOne | Static AI - Suspicious PE |
Fortinet | W32/PossibleThreat |
CrowdStrike | win/malicious_confidence_100% (W) |
dead_host | 113.52.134.114:443 |