Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | April 12, 2024, 3:08 p.m. | April 12, 2024, 3:08 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
packer | Armadillo v1.71 |
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00091194 | size | 0x00000468 |
Cynet | Malicious (score: 99) |
ALYac | DeepScan:Generic.Rincux2.519143E0 |
Cylance | unsafe |
VIPRE | DeepScan:Generic.Rincux2.519143E0 |
Sangfor | Suspicious.Win32.Save.ins |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | DeepScan:Generic.Rincux2.519143E0 |
K7GW | Trojan ( 005001511 ) |
K7AntiVirus | Trojan ( 005001511 ) |
Baidu | Win32.Trojan.Kryptik.te |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Kryptik.HFZK |
APEX | Malicious |
Avast | Win32:DropperX-gen [Drp] |
ClamAV | Win.Trojan.Agent-7165147-1 |
Kaspersky | Backdoor.Win32.Farfli.bryz |
Alibaba | Backdoor:Win32/Farfli.548a3a69 |
NANO-Antivirus | Trojan.Win32.Farfli.fzqipo |
MicroWorld-eScan | DeepScan:Generic.Rincux2.519143E0 |
Rising | Trojan.Kryptik!1.AAD1 (CLASSIC) |
Emsisoft | DeepScan:Generic.Rincux2.519143E0 (B) |
F-Secure | Heuristic.HEUR/AGEN.1347744 |
DrWeb | VBS.Dropper.5 |
Zillya | Backdoor.Farfli.Win32.8809 |
TrendMicro | TROJ_FRS.0NA103DU23 |
FireEye | Generic.mg.25b1052f544cdf4c |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Win32.Injector |
Jiangmin | Trojan.Generic.dyfei |
Detected | |
Avira | HEUR/AGEN.1347744 |
MAX | malware (ai score=89) |
Antiy-AVL | Trojan/Win32.Fuerboos |
Kingsoft | malware.kb.a.993 |
Arcabit | DeepScan:Generic.Rincux2.519143E0 |
ZoneAlarm | Backdoor.Win32.Farfli.bryz |
GData | DeepScan:Generic.Rincux2.519143E0 |
Varist | W32/Trojan.XCFU-0598 |
AhnLab-V3 | Malware/Win32.Generic.C4316987 |
BitDefenderTheta | Gen:NN.ZexaF.36802.Kq0@aKgieDbj |
DeepInstinct | MALICIOUS |
VBA32 | BScope.Trojan.Pynamer |
Malwarebytes | Malware.AI.4122844495 |
Panda | Trj/CI.A |
TrendMicro-HouseCall | TROJ_FRS.0NA103DU23 |
Tencent | Backdoor.Win32.farfli.16000311 |
Yandex | Trojan.Kryptik!Py7RiKLYMq0 |
MaxSecure | Trojan.Malware.101797850.susgen |
Fortinet | W32/Kryptik.DDGL!tr |