Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 27, 2024, 1:36 p.m. | Sept. 27, 2024, 1:39 p.m. |
-
beacon.exe "C:\Users\test22\AppData\Local\Temp\beacon.exe"
2556
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .symtab |
section | {u'size_of_data': u'0x00063c00', u'virtual_address': u'0x00553000', u'entropy': 7.996182619594343, u'name': u'/19', u'virtual_size': u'0x00063b9a'} | entropy | 7.99618261959 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00015200', u'virtual_address': u'0x005b7000', u'entropy': 7.943001203897662, u'name': u'/32', u'virtual_size': u'0x0001502b'} | entropy | 7.9430012039 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x000d1c00', u'virtual_address': u'0x005ce000', u'entropy': 7.998409121787395, u'name': u'/65', u'virtual_size': u'0x000d1a18'} | entropy | 7.99840912179 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x0007ec00', u'virtual_address': u'0x006a0000', u'entropy': 7.995464355223593, u'name': u'/78', u'virtual_size': u'0x0007ea34'} | entropy | 7.99546435522 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00025600', u'virtual_address': u'0x0071f000', u'entropy': 7.805484181154835, u'name': u'/90', u'virtual_size': u'0x0002547d'} | entropy | 7.80548418115 | description | A section with a high entropy has been found | |||||||||
entropy | 0.274080742331 | description | Overall entropy of this PE file is high |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win64.Goshell.tsCV |
Cynet | Malicious (score: 99) |
Skyhigh | BehavesLike.Win64.TrojanRansom.wh |
ALYac | Trojan.Generic.36694433 |
Cylance | Unsafe |
VIPRE | Trojan.Generic.36694433 |
Sangfor | Trojan.Win64.Goshell.V1a7 |
CrowdStrike | win/malicious_confidence_60% (D) |
BitDefender | Trojan.Generic.36694433 |
K7GW | Trojan ( 005aee7d1 ) |
K7AntiVirus | Trojan ( 005aee7d1 ) |
Arcabit | Trojan.Generic.D22FE9A1 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of WinGo/ShellcodeRunner.OC |
Avast | Win64:Malware-gen |
Kaspersky | HEUR:Trojan.Win64.Goshell.gen |
Alibaba | Trojan:Win64/Goshell.4255c828 |
MicroWorld-eScan | Trojan.Generic.36694433 |
Emsisoft | Trojan.Generic.36694433 (B) |
F-Secure | Trojan.TR/AVI.Agent.romti |
Zillya | Trojan.ShellcodeRunner.Win32.5109 |
TrendMicro | TROJ_GEN.R03BC0WHD24 |
McAfeeD | ti!D15E35DCB836 |
CTX | exe.trojan.goshell |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
FireEye | Trojan.Generic.36694433 |
Detected | |
Avira | TR/AVI.Agent.romti |
Antiy-AVL | Trojan/Win64.GoShell |
Kingsoft | Win64.Trojan.Goshell.gen |
Microsoft | Trojan:Win32/Wacatac.B!ml |
ZoneAlarm | HEUR:Trojan.Win64.Goshell.gen |
GData | Trojan.Generic.36694433 |
Varist | W64/ABTrojan.WXXM-3963 |
McAfee | Artemis!698977A5B343 |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.1110130440 |
Ikarus | Trojan.WinGo.Rozena |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | TROJ_GEN.R03BC0WHD24 |
Tencent | Win64.Trojan.Goshell.Rimw |
huorong | Backdoor/W64.CobaltStrike.bp |
MaxSecure | Trojan.Malware.207061521.susgen |
Fortinet | W64/Agent.TL!tr |
AVG | Win64:Malware-gen |
Paloalto | generic.ml |
alibabacloud | Trojan:Multi/ShellcodeRunner.OW |