Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 11, 2024, 9:15 a.m. | July 11, 2024, 9:19 a.m. |
-
3.exe "C:\Users\test22\AppData\Local\Temp\3.exe"
2644
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0241a850 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0241a850 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0241a850 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0241a850 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0241a850 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0241a850 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0241a850 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0241a850 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0241a850 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0241a850 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0241a850 | size | 0x00000468 | ||||||||||||||||||
name | RT_STRING | language | LANG_JAPANESE | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x0241b790 | size | 0x000001fc | ||||||||||||||||||
name | RT_STRING | language | LANG_JAPANESE | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x0241b790 | size | 0x000001fc | ||||||||||||||||||
name | RT_STRING | language | LANG_JAPANESE | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x0241b790 | size | 0x000001fc | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_JAPANESE | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x0241acb8 | size | 0x00000076 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_JAPANESE | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x0241acb8 | size | 0x00000076 |
section | {u'size_of_data': u'0x0001c000', u'virtual_address': u'0x00001000', u'entropy': 7.764823788733625, u'name': u'.text', u'virtual_size': u'0x0001be3e'} | entropy | 7.76482378873 | description | A section with a high entropy has been found | |||||||||
entropy | 0.530805687204 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Tofsee.m!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win32.Lockbit.dh |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Riskware ( 00584baa1 ) |
BitDefender | Gen:Variant.Midie.150841 |
K7GW | Riskware ( 00584baa1 ) |
Arcabit | Trojan.Midie.D24D39 |
Symantec | ML.Attribute.HighConfidence |
tehtris | Generic.Malware |
ESET-NOD32 | a variant of Win32/Kryptik.HXLR |
APEX | Malicious |
McAfee | Artemis!293460728C83 |
Avast | Win32:CrypterX-gen [Trj] |
ClamAV | Win.Packer.pkr_ce1a-9980177-0 |
Kaspersky | HEUR:Backdoor.Win32.Tofsee.gen |
Alibaba | Backdoor:Win32/Smokeloader.25c77ea2 |
MicroWorld-eScan | Gen:Variant.Midie.150841 |
Rising | Backdoor.Tofsee!8.1E9 (TFE:5:K9grGyeiw1K) |
Emsisoft | Gen:Variant.Midie.150841 (B) |
F-Secure | Trojan.TR/Crypt.Agent.vsnuk |
TrendMicro | Trojan.Win32.PRIVATELOADER.YXEGJZ |
McAfeeD | Real Protect-LS!293460728C83 |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.293460728c83e7be |
Sophos | Troj/Krypt-VK |
Ikarus | Trojan.Win32.Krypt |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/Crypt.Agent.vsnuk |
MAX | malware (ai score=88) |
Kingsoft | Win32.Hack.Tofsee.gen |
Gridinsoft | Trojan.Win32.SmokeLoader.tr |
Microsoft | Trojan:Win32/Smokeloader.SPXV!MTB |
ZoneAlarm | HEUR:Backdoor.Win32.Tofsee.gen |
GData | Win32.Trojan-Downloader.SmokeLoader.NRWNJM |
Varist | W32/Kryptik.MIZ.gen!Eldorado |
AhnLab-V3 | Trojan/Win.Generic.R657819 |
Acronis | suspicious |
BitDefenderTheta | Gen:NN.ZexaF.36808.nq0@aqZwQljG |
DeepInstinct | MALICIOUS |
Malwarebytes | Trojan.MalPack.GS |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | Trojan.Win32.PRIVATELOADER.YXEGJZ |
Tencent | Trojan.Win32.Obfuscated.gen |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |