Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 5, 2024, 10:36 a.m. | Aug. 5, 2024, 11 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | _RDATA |
file | C:\Users\test22\AppData\Local\Temp\_MEI26442\libcrypto-1_1.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26442\VCRUNTIME140.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26442\libssl-1_1.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26442\libffi-7.dll |
file | C:\Users\test22\AppData\Local\Temp\_MEI26442\python310.dll |
section | {u'size_of_data': u'0x0000f200', u'virtual_address': u'0x00052000', u'entropy': 7.3562416368637376, u'name': u'.rsrc', u'virtual_size': u'0x0000f008'} | entropy | 7.35624163686 | description | A section with a high entropy has been found |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Tiny.tsdM |
Cynet | Malicious (score: 99) |
Cylance | Unsafe |
Sangfor | Exploit.Python.CVE.Vqln |
Symantec | Trojan.Gen.MBT |
ESET-NOD32 | Python/Exploit.Agent.AB |
McAfee | Artemis!5AB40605ED83 |
Avast | FileRepMalware [Misc] |
Kaspersky | HEUR:Exploit.Python.CVE-2020-1472.gen |
Alibaba | Exploit:Win32/CVE-2020-1472.5382a5b6 |
F-Secure | Trojan.TR/Redcap.yrgqc |
McAfeeD | ti!7C0520ED937B |
Sophos | Mal/Generic-S |
Avira | TR/Redcap.yrgqc |
Kingsoft | Win32.Troj.Unknown.a |
Microsoft | Trojan:Win32/Wacatac.B!ml |
ZoneAlarm | HEUR:Exploit.Python.CVE-2020-1472.gen |
AhnLab-V3 | Exploit/Win.Agent.C5304190 |
DeepInstinct | MALICIOUS |
VBA32 | Exploit.Python |
Panda | Trj/CI.A |
Tencent | Win32.Exploit.Cve-2020-1472.Ztjl |
Fortinet | W32/PossibleThreat |
AVG | FileRepMalware [Misc] |
CrowdStrike | win/malicious_confidence_100% (W) |
alibabacloud | Exploit:Win/MS17-010.E |