Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Jan. 12, 2025, 2:31 p.m. | Jan. 12, 2025, 2:34 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
chuanqi.ydns.eu | 122.10.119.64 | |
hzh.0xox0xox0.com |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
packer | Armadillo v1.71 |
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0007af18 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0007af18 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0007af18 | size | 0x00000468 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0007b380 | size | 0x00000022 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0007b380 | size | 0x00000022 | ||||||||||||||||||
name | RT_MANIFEST | language | LANG_CHINESE | filetype | XML 1.0 document text | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0007b3a8 | size | 0x0000028b |
cmdline | C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\test22\AppData\Local\Temp\BEACON~1.EXE > nul |
file | C:\Users\test22\AppData\Local\Temp\beacon_x86.exe |
section | {u'size_of_data': u'0x0006b000', u'virtual_address': u'0x00001000', u'entropy': 7.79080369509675, u'name': u'.data', u'virtual_size': u'0x0006afce'} | entropy | 7.7908036951 | description | A section with a high entropy has been found | |||||||||
entropy | 0.873469387755 | description | Overall entropy of this PE file is high |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | ping -n 2 127.0.0.1 |
cmdline | C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\test22\AppData\Local\Temp\BEACON~1.EXE > nul |
service_name | Jbrjar Kbskb | service_path | C:\Program Files\Jbrja.exe -auto |
dead_host | 122.10.119.64:10086 |
Bkav | W32.AIDetectMalware |
MicroWorld-eScan | Dump:Generic.KillMBR.A.BFFADF29 |
CTX | exe.unknown.dump |
CAT-QuickHeal | Backdoor.GenericRI.S22015472 |
Skyhigh | BehavesLike.Win32.FakeAVSecurityTool.gc |
ALYac | Dump:Generic.KillMBR.A.BFFADF29 |
Cylance | Unsafe |
VIPRE | Dump:Generic.KillMBR.A.BFFADF29 |
Sangfor | Suspicious.Win32.Save.ins |
CrowdStrike | win/malicious_confidence_100% (W) |
Alibaba | Backdoor:Win32/Farfli.0e50a659 |
K7GW | Trojan ( 0055d49e1 ) |
K7AntiVirus | Trojan ( 0055d49e1 ) |
Arcabit | Dump:Generic.KillMBR.A.BFFADF29 |
VirIT | Trojan.Win32.Genus.XLY |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Farfli.DBU |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | Backdoor.Win32.Farfli.byde |
BitDefender | Dump:Generic.KillMBR.A.BFFADF29 |
NANO-Antivirus | Trojan.Win32.Farfli.joxpfl |
Rising | Backdoor.Farfli!1.E02F (CLASSIC) |
Emsisoft | Dump:Generic.KillMBR.A.BFFADF29 (B) |
F-Secure | Trojan.TR/Crypt.XPACK.Gen |
DrWeb | BackDoor.Farfli.147 |
Zillya | Trojan.Farfli.Win32.40702 |
McAfeeD | Real Protect-LS!A40E4A8AAF47 |
Trapmine | malicious.high.ml.score |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
FireEye | Generic.mg.a40e4a8aaf476b3d |
Jiangmin | Backdoor.Generic.cknp |
Webroot | Win.Trojan.Farfli |
Detected | |
Avira | TR/Crypt.XPACK.Gen |
Antiy-AVL | Trojan/Win32.Farfli |
Kingsoft | Win32.Hack.Generic.a |
Microsoft | Backdoor:Win32/Farfli!pz |
GData | Dump:Generic.KillMBR.A.BFFADF29 |
AhnLab-V3 | Trojan/Win.Farfli.C4702709 |
McAfee | GenericRXRR-WJ!A40E4A8AAF47 |
DeepInstinct | MALICIOUS |
VBA32 | BScope.Backdoor.Farfli |
Malwarebytes | MachineLearning/Anomalous.97% |
Ikarus | Trojan.Win32.Hrup |
Tencent | Malware.Win32.Gencirc.10bd087c |
huorong | Backdoor/Farfli.bq |
Fortinet | W32/GenKryptik.DJUZ!tr |