1.8
低危

ffa1b3f20de76186151ed955d5bd41c2fc69148378fd4911ceacfc3ee990d065

49d6d18946dd4fa3e3da73f65ebc31f1.exe

分析耗时

74s

最近分析

文件大小

14.5KB
静态报毒 动态报毒 RAMNITCRTD
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee 20181119 6.0.6.653
Alibaba 20180921 0.1.0.2
Baidu 20181116 1.0.0.2
Avast 20181119 18.4.3895.0
Kingsoft 20181119 2013.8.14.323
Tencent 20181119 1.0.0.1
CrowdStrike 20181022 1.0
静态指标
This executable is signed
This executable has a PDB path (1 个事件)
pdb_path D:\HOffice90-Master-2013\file-converter\ODF_OOXML_Converter\HncOdfConverterExcute\Release Viewer\HncOdfConverter.exe.pdb
行为判定
动态指标
Foreign language identified in PE resource (1 个事件)
name RT_VERSION language LANG_KOREAN offset 0x000040a0 filetype data sublanguage SUBLANG_KOREAN size 0x00000310
File has been identified by one AntiVirus engine on VirusTotal as malicious (1 个事件)
Zillya Backdoor.RamnitCRTD.Win32.12288
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2017-01-31 18:09:16

Imports

Library HncOdfConverter.dll:
0x402000 ConvertFile
Library MSVCR120.dll:
0x40202c exit
0x402030 _exit
0x402034 _cexit
0x402038 _configthreadlocale
0x40203c __setusermatherr
0x402040 _initterm_e
0x402044 _initterm
0x402048 __winitenv
0x40204c _fmode
0x402050 _commode
0x402054 __set_app_type
0x402060 ?terminate@@YAXXZ
0x402068 _lock
0x40206c _unlock
0x402070 _calloc_crt
0x402074 __dllonexit
0x402078 _onexit
0x40207c _invoke_watson
0x402080 _controlfp_s
0x402088 __wgetmainargs
0x40208c _amsg_exit
0x402090 _XcptFilter
0x402094 printf
0x402098 _crt_debugger_hook
Library KERNEL32.dll:
0x402008 DecodePointer
0x40200c GetCurrentThreadId
0x402010 GetCurrentProcessId
0x40201c IsDebuggerPresent
0x402020 EncodePointer

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57874 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 53238 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 62319 239.255.255.250 3702
192.168.56.101 62321 239.255.255.250 3702

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.