Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 11, 2024, 1:16 p.m. | July 11, 2024, 1:30 p.m. |
-
msmger.exe "C:\Users\test22\AppData\Local\Temp\msmger.exe"
2632
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | {u'size_of_data': u'0x00355000', u'virtual_address': u'0x00082000', u'entropy': 7.986819801096968, u'name': u'.data', u'virtual_size': u'0x00354e20'} | entropy | 7.9868198011 | description | A section with a high entropy has been found | |||||||||
entropy | 0.746036952006 | description | Overall entropy of this PE file is high |
Bkav | W64.AIDetectMalware |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win64.Generic.rc |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
APEX | Malicious |
Trapmine | suspicious.low.ml.score |
FireEye | Generic.mg.a81771f0ecb1e53a |
Ikarus | Trojan.WinGo.Crypt |
Detected | |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.2932803739 |
Fortinet | Malicious_Behavior.SB |
CrowdStrike | win/malicious_confidence_90% (D) |