Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 10, 2024, 12:26 p.m. | Aug. 10, 2024, 1:10 p.m. |
-
66b4b10e9ef0b_stealc_default.exe "C:\Users\test22\AppData\Local\Temp\66b4b10e9ef0b_stealc_default.exe"
2544
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
name | RT_ICON | language | LANG_TURKISH | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000525f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_TURKISH | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000525f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_TURKISH | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000525f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_TURKISH | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000525f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_TURKISH | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000525f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_TURKISH | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000525f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_TURKISH | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000525f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_TURKISH | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x00052a58 | size | 0x00000068 |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Stealerc.1m!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Ransom.Stop.P5 |
Skyhigh | BehavesLike.Win32.Lockbit.dh |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7GW | Hacktool ( 700007861 ) |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | Win32/Stealc.A |
APEX | Malicious |
Avast | Win32:PWSX-gen [Trj] |
ClamAV | Win.Ransomware.Convagent-10034455-0 |
Kaspersky | HEUR:Trojan-PSW.Win32.Stealerc.gen |
Alibaba | Trojan:Win32/Stealc.c8c43939 |
Rising | Trojan.Kryptik@AI.100 (RDML:iFEku3AJLN2kOlbeLLAH8Q) |
F-Secure | Trojan.TR/AD.Stealc.yteee |
TrendMicro | Trojan.Win32.PRIVATELOADER.YXEHHZ |
McAfeeD | Real Protect-LS!9B43256A3314 |
Trapmine | malicious.moderate.ml.score |
FireEye | Generic.mg.9b43256a33142e46 |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
Detected | |
Avira | TR/AD.Stealc.yteee |
Kingsoft | Win32.Trojan-PSW.Stealerc.gen |
Gridinsoft | Ransom.Win32.Sabsik.sa |
Microsoft | Trojan:Win32/Smokeloader.NEE!MTB |
ViRobot | Trojan.Win.Z.Stealerc.268288 |
ZoneAlarm | HEUR:Trojan-PSW.Win32.Stealerc.gen |
GData | Win32.Packed.Kryptik.9KK0MI |
Varist | W32/Kryptik.MOY.gen!Eldorado |
AhnLab-V3 | Trojan/Win.Generic.R660479 |
Acronis | suspicious |
BitDefenderTheta | Gen:NN.ZexaF.36810.qq0@aCBV2VmG |
DeepInstinct | MALICIOUS |
VBA32 | BScope.Trojan.Yakes |
Malwarebytes | Generic.Malware/Suspicious |
Ikarus | Win32.Outbreak |
TrendMicro-HouseCall | Trojan.Win32.PRIVATELOADER.YXEHHZ |
Fortinet | W32/Stealc.A!tr |
AVG | Win32:PWSX-gen [Trj] |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_100% (W) |