danger |
Win32_Trojan_Emotet_1_Zero |
Win32 Trojan Emotet |
binaries (download) |
warning |
Generic_Malware_Zero |
Generic Malware |
binaries (download) |
warning |
NMap |
NMAP |
binaries (download) |
watch |
Malicious_Library_Zero |
Malicious_Library |
binaries (download) |
watch |
Malicious_Packer_Zero |
Malicious Packer |
binaries (download) |
watch |
Network_Downloader |
File Downloader |
memory |
watch |
schtasks_Zero |
task schedule |
memory |
watch |
UPX_Zero |
UPX packed file |
binaries (download) |
notice |
anti_vm_detect |
Possibly employs anti-virtualization techniques |
binaries (download) |
notice |
Code_injection |
Code injection with CreateRemoteThread in a remote process |
memory |
notice |
Create_Service |
Create a windows service |
memory |
notice |
Escalate_priviledges |
Escalate priviledges |
memory |
notice |
Generic_PWS_Memory_Zero |
PWS Memory |
memory |
notice |
Hijack_Network |
Hijack network configuration |
memory |
notice |
KeyLogger |
Run a KeyLogger |
memory |
notice |
local_credential_Steal |
Steal credential |
memory |
notice |
Network_DGA |
Communication using DGA |
memory |
notice |
Network_DNS |
Communications use DNS |
memory |
notice |
Network_FTP |
Communications over FTP |
memory |
notice |
Network_HTTP |
Communications over HTTP |
memory |
notice |
Network_P2P_Win |
Communications over P2P network |
memory |
notice |
Network_TCP_Socket |
Communications over RAW Socket |
memory |
notice |
Persistence |
Install itself for autorun at Windows startup |
memory |
notice |
ScreenShot |
Take ScreenShot |
memory |
notice |
Sniff_Audio |
Record Audio |
memory |
notice |
Str_Win32_Http_API |
Match Windows Http API call |
memory |
notice |
Str_Win32_Internet_API |
Match Windows Inet API call |
memory |
info |
anti_dbg |
Checks if being debugged |
memory |
info |
anti_dbgtools |
Checks for the presence of known debug tools |
memory |
info |
antisb_threatExpert |
Anti-Sandbox checks for ThreatExpert |
memory |
info |
Check_Dlls |
(no description) |
memory |
info |
DebuggerCheck__GlobalFlags |
(no description) |
memory |
info |
DebuggerCheck__QueryInfo |
(no description) |
memory |
info |
DebuggerCheck__RemoteAPI |
(no description) |
memory |
info |
DebuggerException__ConsoleCtrl |
(no description) |
memory |
info |
DebuggerException__SetConsoleCtrl |
(no description) |
memory |
info |
DebuggerHiding__Active |
(no description) |
memory |
info |
DebuggerHiding__Thread |
(no description) |
memory |
info |
disable_antivirus |
Disable AntiVirus |
memory |
info |
disable_dep |
Bypass DEP |
memory |
info |
DllRegisterServer_Zero |
execute regsvr32.exe |
binaries (download) |
info |
IsDLL |
(no description) |
binaries (download) |
info |
IsPE32 |
(no description) |
binaries (download) |
info |
lnk_file_format |
Microsoft Windows Shortcut File Format |
binaries (download) |
info |
Lnk_Format_Zero |
LNK Format |
binaries (download) |
info |
OS_Processor_Check_Zero |
OS Processor Check |
binaries (download) |
info |
PE_Header_Zero |
PE File Signature |
binaries (download) |
info |
PE_Header_Zero |
PE File Signature |
binaries (upload) |
info |
SEH__vectored |
(no description) |
memory |
info |
ThreadControl__Context |
(no description) |
memory |
info |
vmdetect |
Possibly employs anti-virtualization techniques |
memory |
info |
win_hook |
Affect hook table |
memory |