2.8
中危

cb0373b35abf4b089be60e714ee415d3491ddc2cffcfb45b84a87a3a106c822f

229b5796c4f4ee14fc4e6ba28aaeeb50.exe

分析耗时

15s

最近分析

文件大小

570.8KB
静态报毒 动态报毒 100% AI SCORE=100 AIDETECT AUWU CLOUD CONFIDENCE ERSF GENCIRC GENKRYPTIK HGIASOQA HIGH CONFIDENCE HNBNAM INVALIDSIG JOHNNIE JQZ@ASPKW KOVTER KRYPTIK LDZRV MALWARE2 MALWARE@#1KWMLTQASUQSK OCCAMY RACEALER REVIL RJPR S + TROJ SCORE SODIN SODINO SODINOKIBI SODNKIBI STATIC AI SUSGEN SUSPICIOUS PE UNSAFE XLU2FB2K67U ZEXAF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Ransom-Sodnkibi 20210406 6.0.6.653
CrowdStrike win/malicious_confidence_100% (D) 20210203 1.0
Alibaba Ransom:Win32/Sodin.c456da9c 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Trojan-gen 20210405 21.1.5827.0
Kingsoft 20210406 2017.9.26.565
Tencent Malware.Win32.Gencirc.1182567f 20210406 1.0.0.1
静态指标
行为判定
动态指标
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 6.889416945002527 section {'size_of_data': '0x0002b000', 'virtual_address': '0x00045000', 'entropy': 6.889416945002527, 'name': '.rsrc', 'virtual_size': '0x0002a050'} description A section with a high entropy has been found
entropy 0.3944954128440367 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
File has been identified by 59 AntiVirus engines on VirusTotal as malicious (50 out of 59 个事件)
Bkav W32.AIDetect.malware2
Elastic malicious (high confidence)
CAT-QuickHeal Trojanransom.Sodin
McAfee Ransom-Sodnkibi
Malwarebytes Ransom.Sodinokibi
Zillya Trojan.GenKryptik.Win32.48604
Sangfor Ransom.Win32.Sodin.db
CrowdStrike win/malicious_confidence_100% (D)
Alibaba Ransom:Win32/Sodin.c456da9c
K7GW Spyware ( 0054b83d1 )
K7AntiVirus Spyware ( 0054b83d1 )
Arcabit Trojan.Johnnie.D3C705
Cyren W32/Ransom.RJPR-7371
Symantec Trojan Horse
ESET-NOD32 a variant of Win32/GenKryptik.ERSF
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 85)
Kaspersky Trojan-Ransom.Win32.Sodin.db
BitDefender Gen:Variant.Johnnie.247557
NANO-Antivirus Trojan.Win32.Racealer.hnbnam
MicroWorld-eScan Gen:Variant.Johnnie.247557
Avast Win32:Trojan-gen
Rising Ransom.Agent!8.6B7 (CLOUD)
Ad-Aware Gen:Variant.Johnnie.247557
Emsisoft Gen:Variant.Johnnie.247557 (B)
Comodo Malware@#1kwmltqasuqsk
DrWeb Trojan.Encoder.31912
VIPRE Trojan.Win32.Generic!BT
TrendMicro Ransom.Win32.SODINOKIBI.AUWU
McAfee-GW-Edition Ransom-Sodnkibi
FireEye Generic.mg.229b5796c4f4ee14
Sophos Mal/Generic-S + Troj/Sodino-BD
Ikarus Trojan.Win32.Kovter
Jiangmin Trojan.Sodin.bn
eGambit PE.Heur.InvalidSig
Avira TR/Kryptik.ldzrv
Gridinsoft Trojan.Win32.Kryptik.oa!s1
Microsoft Trojan:Win32/Occamy.AA
AegisLab Trojan.Win32.Sodin.j!c
ZoneAlarm Trojan-Ransom.Win32.Sodin.db
GData Gen:Variant.Johnnie.247557
Acronis suspicious
BitDefenderTheta Gen:NN.ZexaF.34670.JqZ@aSPkW!cc
ALYac Trojan.Ransom.Sodinokibi
MAX malware (ai score=100)
VBA32 TrojanRansom.Sodin
Cylance Unsafe
TrendMicro-HouseCall Ransom.Win32.SODINOKIBI.AUWU
Tencent Malware.Win32.Gencirc.1182567f
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-05-12 22:17:30

Imports

Library KERNEL32.dll:
0x43b010 GetThreadLocale
0x43b014 GetVersion
0x43b018 MultiByteToWideChar
0x43b01c WideCharToMultiByte
0x43b020 GetLocaleInfoA
0x43b024 lstrlenA
0x43b028 GetProcAddress
0x43b02c LoadLibraryA
0x43b034 GetTickCount
0x43b038 GetLastError
0x43b040 RaiseException
0x43b044 GetACP
0x43b048 InterlockedExchange
0x43b04c GetVersionExA
0x43b050 GetModuleFileNameW
0x43b054 OpenFileMappingA
0x43b058 CreateFileMappingA
0x43b05c ExitProcess
0x43b060 DebugBreak
0x43b064 GetStdHandle
0x43b068 WriteFile
0x43b070 OutputDebugStringA
0x43b078 GetModuleFileNameA
0x43b07c RtlUnwind
0x43b080 VirtualProtect
0x43b084 VirtualAlloc
0x43b088 GetSystemInfo
0x43b08c VirtualQuery
0x43b090 IsBadWritePtr
0x43b094 IsBadReadPtr
0x43b098 HeapValidate
0x43b09c GetModuleHandleA
0x43b0a0 GetStartupInfoA
0x43b0a4 GetCommandLineA
0x43b0ac GetCurrentThreadId
0x43b0b0 GetCurrentProcessId
0x43b0bc TerminateProcess
0x43b0c0 GetCurrentProcess
0x43b0c4 TlsAlloc
0x43b0c8 TlsFree
0x43b0cc TlsSetValue
0x43b0d0 TlsGetValue
0x43b0d4 SetLastError
0x43b0d8 GetCurrentThread
0x43b0dc HeapFree
0x43b0e4 HeapAlloc
0x43b0e8 HeapReAlloc
0x43b0ec HeapDestroy
0x43b0f0 HeapCreate
0x43b0f4 VirtualFree
0x43b10c SetHandleCount
0x43b110 GetFileType
0x43b118 IsBadCodePtr
0x43b11c GetOEMCP
0x43b120 GetCPInfo
0x43b124 GetStringTypeA
0x43b128 GetStringTypeW
0x43b12c SetFilePointer
0x43b130 LCMapStringA
0x43b134 LCMapStringW
0x43b138 SetStdHandle
0x43b13c FlushFileBuffers
0x43b140 CloseHandle
0x43b144 SetEvent
0x43b148 OpenEventA
0x43b14c lstrcpyA
0x43b150 lstrcpyW
0x43b154 OutputDebugStringW
0x43b158 lstrcpynW
0x43b15c WaitForSingleObject
0x43b160 UnmapViewOfFile
0x43b164 MapViewOfFile
Library USER32.dll:
0x43b170 DispatchMessageA
0x43b174 DispatchMessageW
0x43b178 TranslateMessage
0x43b17c GetMessageA
0x43b180 GetMessageW
0x43b184 IsWindowUnicode
0x43b188 PeekMessageA
Library ADVAPI32.dll:
0x43b000 SetThreadToken
0x43b004 OpenThreadToken
0x43b008 RevertToSelf
Library ole32.dll:
0x43b194 CoMarshalInterface
0x43b1a0 CoRevokeClassObject

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 63429 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51809 239.255.255.250 3702
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58707 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.