Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Aug. 4, 2024, 5:53 p.m. | Aug. 4, 2024, 5:55 p.m. |
-
Submit task v3.0.0.4.exe "C:\Users\test22\AppData\Local\Temp\Submit task v3.0.0.4.exe"
3024
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000af130 | size | 0x00005488 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000b45b8 | size | 0x00000014 | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000b45cc | size | 0x0000025c | ||||||||||||||||||
name | RT_MANIFEST | language | LANG_CHINESE | filetype | XML 1.0 document, ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000b4828 | size | 0x000001cd |
section | {u'size_of_data': u'0x000abc00', u'virtual_address': u'0x00003000', u'entropy': 7.029778353573038, u'name': u'.data', u'virtual_size': u'0x000abc00'} | entropy | 7.02977835357 | description | A section with a high entropy has been found | |||||||||
entropy | 0.964887640449 | description | Overall entropy of this PE file is high |
regkey | HKEY_CURRENT_USER\Software\FlySky\E\Install |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Flyagent.4!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win32.Flyagent.bc |
ALYac | Trojan.Generic.36433771 |
Cylance | Unsafe |
VIPRE | Trojan.Generic.36433771 |
Sangfor | Trojan.Win32.Agent.V4xj |
BitDefender | Trojan.Generic.36433771 |
Cybereason | malicious.fc2915 |
Arcabit | Trojan.Generic.D22BEF6B |
APEX | Malicious |
McAfee | Flyagent.d |
Avast | Win32:TrojanX-gen [Trj] |
Alibaba | Trojan:Win32/Flyagent.e5249a03 |
NANO-Antivirus | Virus.Win32.Agent.dvixmz |
MicroWorld-eScan | Trojan.Generic.36433771 |
Emsisoft | Trojan.Generic.36433771 (B) |
F-Secure | Trojan.TR/Dropper.Gen |
TrendMicro | TROJ_GEN.R023C0PFH24 |
McAfeeD | Real Protect-LS!1FE2D68FC291 |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.1fe2d68fc2915ff7 |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Crypt |
Jiangmin | Trojan.Agentb.mvr |
Detected | |
Avira | TR/Dropper.Gen |
Antiy-AVL | Trojan/Win32.Wacatac |
Kingsoft | malware.kb.a.998 |
Xcitium | TrojWare.Win32.FlyStudio.~UJ@1sa9s6 |
Microsoft | TrojanDownloader:Win32/Upatre!ml |
GData | Trojan.Generic.36433771 |
Varist | W32/ABRisk.JTDM-2316 |
BitDefenderTheta | Gen:NN.ZexaF.36810.Sq0@ayy0ycob |
DeepInstinct | MALICIOUS |
VBA32 | Trojan.Fuerboos |
Malwarebytes | Malware.AI.3957663759 |
TrendMicro-HouseCall | TROJ_GEN.R023C0PFH24 |
MAX | malware (ai score=80) |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/CoinMiner.BELF!tr |
AVG | Win32:TrojanX-gen [Trj] |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_90% (D) |
alibabacloud | Suspicious |