Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 21, 2024, 3:47 p.m. | June 21, 2024, 3:49 p.m. |
-
storyhosts.exe "C:\Users\test22\AppData\Local\Temp\storyhosts.exe"
516
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | {u'size_of_data': u'0x000aa000', u'virtual_address': u'0x0007f000', u'entropy': 7.871480226921034, u'name': u'UPX1', u'virtual_size': u'0x000aa000'} | entropy | 7.87148022692 | description | A section with a high entropy has been found | |||||||||
entropy | 0.961810466761 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Generic.4!c |
Elastic | malicious (moderate confidence) |
MicroWorld-eScan | Trojan.GenericKD.73077780 |
Skyhigh | BehavesLike.Win32.TrojanAitInject.bc |
ALYac | Trojan.GenericKD.73077780 |
Cylance | Unsafe |
VIPRE | Trojan.GenericKD.73077780 |
BitDefender | Trojan.GenericKD.73077780 |
Cybereason | malicious.cbad4b |
tehtris | Generic.Malware |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Emsisoft | Trojan.GenericKD.73077780 (B) |
McAfeeD | Real Protect-LS!3C48DDDCBAD4 |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.3c48dddcbad4b1bd |
Sophos | Generic ML PUA (PUA) |
Ikarus | PUA.Autoit |
Jiangmin | Trojan.Selfdel.rvj |
Detected | |
Antiy-AVL | Trojan[Dropper]/Win32.Dorifel |
Kingsoft | malware.kb.b.779 |
Gridinsoft | Ransom.Win32.Bladabindi.sa |
Arcabit | Trojan.Generic.D45B1414 |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Trojan.GenericKD.73077780 |
DeepInstinct | MALICIOUS |
VBA32 | Backdoor.Bladabindi |
Malwarebytes | Malware.AI.2852723073 |
TrendMicro-HouseCall | TROJ_GEN.R002H09FE24 |
Yandex | Trojan.GenAsa!NHzzuRkQa3Y |
MAX | malware (ai score=89) |
Fortinet | Riskware/Application |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_70% (W) |