Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 30, 2024, 11:14 a.m. | Sept. 30, 2024, 11:38 a.m. |
-
-
svchost.exe "C:\Windows\svchost.exe"
2616
-
Name | Response | Post-Analysis Lookup |
---|---|---|
r.pengyou.com |
A
0.0.0.1
|
0.0.0.1 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
packer | UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser |
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00094030 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00094030 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00094030 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00094030 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00094030 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00094030 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00094030 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00094030 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00094030 | size | 0x00000468 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | DOS executable (COM) | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000944ac | size | 0x00000084 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | DOS executable (COM) | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000944ac | size | 0x00000084 | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00099938 | size | 0x000002f8 |
cmdline | C:\Windows\svchost.exe |
cmdline | "C:\Windows\svchost.exe" |
section | {u'size_of_data': u'0x00066400', u'virtual_address': u'0x00032000', u'entropy': 7.742003989036729, u'name': u'UPX1', u'virtual_size': u'0x00067000'} | entropy | 7.74200398904 | description | A section with a high entropy has been found | |||||||||
entropy | 0.991515151515 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
host | 27.25.134.180 |
service_name | svchost | service_path | C:\Windows\svchost.exe |
dead_host | 27.25.134.180:81 |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Farfli.4!c |
Cynet | Malicious (score: 100) |
Skyhigh | GenericRXIH-FL!D954277AF911 |
ALYac | Trojan.GenericKD.73942699 |
Cylance | Unsafe |
VIPRE | Trojan.GenericKD.73942699 |
Sangfor | Backdoor.Win32.Pcclient.V59y |
CrowdStrike | win/malicious_confidence_90% (W) |
BitDefender | Trojan.GenericKD.73942699 |
K7GW | Trojan ( 0050ed721 ) |
K7AntiVirus | Trojan ( 005677151 ) |
Arcabit | Trojan.Generic.D46846AB |
VirIT | Trojan.Win32.Genus.IYD |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | Win32/Farfli.BGG |
APEX | Malicious |
Avast | Win32:TrojanX-gen [Trj] |
ClamAV | Win.Malware.Deepscan-6972384-0 |
Kaspersky | HEUR:Trojan.Win32.Generic |
Alibaba | Backdoor:Win32/Farfli.21e9718e |
NANO-Antivirus | Trojan.Win32.GenKryptik.fslxzc |
MicroWorld-eScan | Trojan.GenericKD.73942699 |
Rising | Backdoor.PcClient!8.119 (TFE:5:UqIb3HcQmoG) |
Emsisoft | Trojan.GenericKD.73942699 (B) |
F-Secure | Trojan.TR/AVI.Fusing.edcss |
Zillya | Trojan.GenKryptik.Win32.31798 |
TrendMicro | TROJ_GEN.R011C0DHJ24 |
McAfeeD | ti!01246CE06D56 |
CTX | exe.trojan.farfli |
Sophos | Mal/Generic-S |
Ikarus | Trojan-Downloader.Win32.Agent |
FireEye | Generic.mg.56fd972f1d650272 |
Jiangmin | Trojan.Generic.bacrz |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/AVI.Fusing.edcss |
Antiy-AVL | Trojan/Win32.Farfli |
Kingsoft | malware.kb.b.945 |
Xcitium | Malware@#2kcufmflc0qlr |
Microsoft | Backdoor:Win32/PcClient |
ZoneAlarm | HEUR:Trojan.Win32.Generic |
GData | Trojan.GenericKD.73942699 |
Varist | W32/ABTrojan.FSIQ-6638 |
AhnLab-V3 | Malware/Win32.Generic.C3325320 |
McAfee | Artemis!56FD972F1D65 |
DeepInstinct | MALICIOUS |
VBA32 | BScope.Trojan-GameThief.Magania |
Malwarebytes | Malware.AI.4120661445 |