Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 2, 2024, 10:12 a.m. | Sept. 2, 2024, 10:35 a.m. |
-
66d17d49c93d8_main.exe "C:\Users\test22\AppData\Local\Temp\66d17d49c93d8_main.exe"
2588
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .symtab |
section | {u'size_of_data': u'0x0006de00', u'virtual_address': u'0x005c9000', u'entropy': 7.996079171264405, u'name': u'/19', u'virtual_size': u'0x0006dc82'} | entropy | 7.99607917126 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00017200', u'virtual_address': u'0x00637000', u'entropy': 7.936670976715747, u'name': u'/32', u'virtual_size': u'0x00017051'} | entropy | 7.93667097672 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x000ec400', u'virtual_address': u'0x00650000', u'entropy': 7.9983769762169565, u'name': u'/65', u'virtual_size': u'0x000ec263'} | entropy | 7.99837697622 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x0008bc00', u'virtual_address': u'0x0073d000', u'entropy': 7.9947467016500005, u'name': u'/78', u'virtual_size': u'0x0008ba89'} | entropy | 7.99474670165 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00029a00', u'virtual_address': u'0x007c9000', u'entropy': 7.810915654573357, u'name': u'/90', u'virtual_size': u'0x0002995a'} | entropy | 7.81091565457 | description | A section with a high entropy has been found | |||||||||
entropy | 0.276835093012 | description | Overall entropy of this PE file is high |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Agentb.X!c |
Skyhigh | BehavesLike.Win64.Smokeloader.wh |
VIPRE | Trojan.GenericKD.73974738 |
Sangfor | Trojan.Win32.Agent.Vrdh |
BitDefender | Trojan.GenericKD.73974738 |
Arcabit | Trojan.Generic.D468C3D2 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | WinGo/TrojanDownloader.Agent.JN |
McAfee | Artemis!01A3155B62C8 |
Kaspersky | Trojan.Win64.Agentb.lamw |
MicroWorld-eScan | Trojan.GenericKD.73974738 |
Emsisoft | Trojan.GenericKD.73974738 (B) |
TrendMicro | Trojan.Win64.PRIVATELOADER.YXEH4Z |
McAfeeD | ti!82475D4397B6 |
FireEye | Trojan.GenericKD.73974738 |
Sophos | Mal/Generic-S |
Webroot | W32.Trojan.Gen |
Detected | |
MAX | malware (ai score=86) |
Gridinsoft | Spy.Win64.Gen.tr |
Microsoft | Trojan:Win32/Casdet!rfn |
ZoneAlarm | Trojan.Win64.Agentb.lamw |
GData | Trojan.GenericKD.73974738 |
AhnLab-V3 | Trojan/Win.Malware-gen.C5663260 |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.4255286112 |
Ikarus | Trojan.WinGo.Rozena |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | Trojan.Win64.PRIVATELOADER.YXEH4Z |
huorong | TrojanDownloader/Agent.bcd |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | Malicious_Behavior.SB |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_60% (D) |