Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Feb. 3, 2025, 10:06 a.m. | Feb. 3, 2025, 10:14 a.m. |
-
6.exe "C:\Users\test22\AppData\Local\Temp\6.exe"
2544
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | G:\ç®å½\2025å·¥ä½ç«\主æ§å·¥ç¨\主æ§ä¿®å¤ä¸çº¿å \shellcode\æ³¨å ¥èªèº«è¿ç¨\Release\æ³¨å ¥èªèº«è¿ç¨.pdb |
resource name | None |
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005ba94 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005ba94 | size | 0x00000144 | ||||||||||||||||||
name | RT_BITMAP | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005ba94 | size | 0x00000144 | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006cf04 | size | 0x00000034 | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006cf04 | size | 0x00000034 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006d874 | size | 0x000001a6 |
section | {u'size_of_data': u'0x00082600', u'virtual_address': u'0x00058000', u'entropy': 7.890194735156755, u'name': u'.rsrc', u'virtual_size': u'0x0008250c'} | entropy | 7.89019473516 | description | A section with a high entropy has been found | |||||||||
entropy | 0.599769982749 | description | Overall entropy of this PE file is high |
Lionic | Trojan.Win32.Agentb.X!c |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Trojan.Agentb |
ALYac | Gen:Variant.Jaik.263476 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Jaik.263476 |
Sangfor | Trojan.Win32.Agent.Aifj |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Gen:Variant.Jaik.263476 |
K7GW | Trojan ( 005c00a71 ) |
K7AntiVirus | Trojan ( 005c00a71 ) |
Arcabit | Trojan.Jaik.D40534 |
Symantec | Trojan.Gen.MBT |
Elastic | Windows.Trojan.TwistedTinsel |
ESET-NOD32 | a variant of Win32/Agent.AHCE |
Avast | Win32:Agent-BDDR [Drp] |
Kaspersky | HEUR:Trojan.Win32.Agentb.gen |
Alibaba | Trojan:Win32/Generic.55d91b25 |
NANO-Antivirus | Trojan.Win32.Babar.kvlmgd |
MicroWorld-eScan | Gen:Variant.Jaik.263476 |
Rising | Trojan.Sabsik!8.128D4 (TFE:5:9u6a2PLrbiL) |
Emsisoft | Gen:Variant.Jaik.263476 (B) |
F-Secure | Trojan.TR/Agent.htebu |
Zillya | Trojan.Agent.Win32.4128111 |
McAfeeD | ti!031995C8C954 |
CTX | exe.trojan.generic |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
FireEye | Gen:Variant.Jaik.263476 |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/Agent.htebu |
Antiy-AVL | GrayWare/Win32.Wacapew |
Kingsoft | Win32.Trojan.Agentb.gen |
Gridinsoft | Ransom.Win32.Wacatac.sa |
Xcitium | Malware@#113vbi47umtkr |
Microsoft | Trojan:Win32/Wacatac.B!ml |
GData | Gen:Variant.Jaik.263476 |
Varist | W32/ABTrojan.LTEJ-8944 |
AhnLab-V3 | Dropper/Win.Generic.R689899 |
McAfee | Artemis!EBB6E511AC2C |
DeepInstinct | MALICIOUS |
VBA32 | BScope.Trojan.Downloader |
Malwarebytes | Malware.AI.1163237881 |
Ikarus | Trojan.Win32.Agent |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | TROJ_GEN.R002H09AP25 |
Tencent | Malware.Win32.Gencirc.10c0a4c2 |
Yandex | Trojan.Agent!ut1/lfR1OZ8 |
MaxSecure | Trojan.Malware.324987160.susgen |