| 查杀引擎 | 查杀结果 | 查杀时间 | 查杀版本 |
|---|---|---|---|
| McAfee | Emotet-FSD!494C5AC20E90 | 20201127 | 6.0.6.653 |
| Alibaba | Trojan:Win32/Emotet.c1671494 | 20190527 | 0.3.0.5 |
| CrowdStrike | win/malicious_confidence_100% (W) | 20190702 | 1.0 |
| Baidu | 20190318 | 1.0.0.2 | |
| Avast | Win32:CrypterX-gen [Trj] | 20201127 | 20.10.5736.0 |
| Tencent | Malware.Win32.Gencirc.10cdfdc3 | 20201127 | 1.0.0.1 |
| Kingsoft | Win32.Troj.Banker.(kcloud) | 20201127 | 2017.9.26.565 |
| Time & API | Arguments | Status | Return | Repeated |
|---|---|---|---|---|
|
1620726232.623008 GetComputerNameA |
computer_name:
OSKAR-PC
|
success | 1 | 0 |
| resource name | None |
| Time & API | Arguments | Status | Return | Repeated |
|---|---|---|---|---|
|
1620726233.045008 GetAdaptersAddresses |
flags:
0
family: 0 |
failed | 111 | 0 |
| entropy | 7.016649021766093 | section | {'size_of_data': '0x00011000', 'virtual_address': '0x00049000', 'entropy': 7.016649021766093, 'name': '.rsrc', 'virtual_size': '0x000101e8'} | description | A section with a high entropy has been found | |||||||||
| process | 494c5ac20e900808d2ee93482ed26bfc.exe |
| Bkav | W32.AIDetectVM.malware2 |
| Elastic | malicious (high confidence) |
| MicroWorld-eScan | Trojan.GenericKD.34603440 |
| FireEye | Generic.mg.494c5ac20e900808 |
| McAfee | Emotet-FSD!494C5AC20E90 |
| Malwarebytes | Trojan.Agent |
| Zillya | Trojan.Emotet.Win32.28389 |
| Sangfor | Malware |
| K7AntiVirus | Trojan ( 0056de091 ) |
| Alibaba | Trojan:Win32/Emotet.c1671494 |
| K7GW | Trojan ( 0056de091 ) |
| CrowdStrike | win/malicious_confidence_100% (W) |
| Arcabit | Trojan.Generic.D21001B0 |
| Cyren | W32/Kryptik.BWJ.gen!Eldorado |
| Symantec | Packed.Generic.554 |
| TrendMicro-HouseCall | TrojanSpy.Win32.EMOTET.SMD4.hp |
| Avast | Win32:CrypterX-gen [Trj] |
| ClamAV | Win.Malware.Emotet-9753021-0 |
| Kaspersky | HEUR:Trojan-Banker.Win32.Emotet.vho |
| BitDefender | Trojan.GenericKD.34603440 |
| NANO-Antivirus | Trojan.Win32.Emotet.hucxwi |
| Paloalto | generic.ml |
| AegisLab | Trojan.Win32.Emotet.trug |
| Tencent | Malware.Win32.Gencirc.10cdfdc3 |
| Ad-Aware | Trojan.GenericKD.34603440 |
| Emsisoft | Trojan.Emotet (A) |
| Comodo | Malware@#20ieuh8mvewrb |
| F-Secure | Trojan.TR/AD.Emotet.arofw |
| DrWeb | Trojan.DownLoader34.32723 |
| VIPRE | Trojan.Win32.Generic!BT |
| TrendMicro | TrojanSpy.Win32.EMOTET.THJABBO |
| McAfee-GW-Edition | BehavesLike.Win32.Emotet.fh |
| Sophos | Mal/Generic-R + Troj/Emotet-CLZ |
| APEX | Malicious |
| Jiangmin | Trojan.Banker.Emotet.oif |
| Avira | TR/AD.Emotet.arofw |
| MAX | malware (ai score=100) |
| Antiy-AVL | Trojan[Banker]/Win32.Emotet |
| Kingsoft | Win32.Troj.Banker.(kcloud) |
| Gridinsoft | Ransom.Win32.Wacatac.oa |
| Microsoft | Trojan:Win32/Emotet.ARK!MTB |
| ZoneAlarm | HEUR:Trojan-Banker.Win32.Emotet.vho |
| GData | Trojan.GenericKD.34603440 |
| Cynet | Malicious (score: 100) |
| AhnLab-V3 | Trojan/Win32.Emotet.R350346 |
| VBA32 | TrojanBanker.Emotet |
| ALYac | Trojan.Agent.Emotet |
| TACHYON | Banker/W32.Emotet.352256.H |
| Cylance | Unsafe |
| ESET-NOD32 | a variant of Win32/Kryptik.HFZB |
| Ordinal | Address | Name |
|---|---|---|
| 1 | 0x401b20 | UUACZDADWAJJJJJ |
No hosts contacted.
No domains contacted.
No TCP connections recorded.
No UDP connections recorded.
No HTTP requests performed.
No ICMP traffic performed.
No IRC requests performed.
No Suricata Alerts
No Suricata TLS
No Snort Alerts