0.9
低危

248caf02f6b7a8896efaaefa28d0aeb9e37b07890a069ac2ff393f64d9285798

248caf02f6b7a8896efaaefa28d0aeb9e37b07890a069ac2ff393f64d9285798.exe

分析耗时

195s

最近分析

365天前

文件大小

7.5KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN RAZY
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.50
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba TrojanPSW:MSIL/Discord.bd08978d 20190527 0.3.0.5
Avast Win32:PWSX-gen [Trj] 20200225 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_80% (D) 20190702 1.0
Kingsoft None 20200225 2013.8.14.323
McAfee PWS-FCML!4E76DF3913F4 20200225 6.0.6.653
Tencent Msil.Trojan-qqpass.Qqrob.Pftm 20200225 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (2 个事件)
host 114.114.114.114
host 8.8.8.8
文件已被 VirusTotal 上 51 个反病毒引擎识别为恶意 (50 out of 51 个事件)
ALYac Gen:Variant.Razy.461180
APEX Malicious
AVG Win32:PWSX-gen [Trj]
Ad-Aware Gen:Variant.Razy.461180
AhnLab-V3 Malware/Win32.RL_Generic.R263796
Alibaba TrojanPSW:MSIL/Discord.bd08978d
Antiy-AVL Trojan[PSW]/MSIL.Agent
Arcabit Trojan.Razy.D7097C
Avast Win32:PWSX-gen [Trj]
Avira HEUR/AGEN.1041225
BitDefender Gen:Variant.Razy.461180
BitDefenderTheta Gen:NN.ZemsilF.34090.am0@auIzoHc
CAT-QuickHeal Trojan.YakbeexMSIL.ZZ4
CrowdStrike win/malicious_confidence_80% (D)
Cybereason malicious.913f49
Cylance Unsafe
Cyren W32/Razy.CN.gen!Eldorado
DrWeb Trojan.PWS.Stealer.25724
ESET-NOD32 a variant of MSIL/PSW.Discord.AP
Emsisoft Gen:Variant.Razy.461180 (B)
Endgame malicious (high confidence)
F-Prot W32/Razy.CN.gen!Eldorado
F-Secure Heuristic.HEUR/AGEN.1041225
FireEye Generic.mg.4e76df3913f49ffe
Fortinet MSIL/Agent.RCF!tr.pws
GData MSIL.Trojan-Stealer.Dhaxx.A
Ikarus Trojan.MSIL.PSW
Invincea heuristic
Jiangmin Trojan.PSW.MSIL.gah
K7AntiVirus Trojan ( 700000121 )
K7GW Trojan ( 700000121 )
Kaspersky HEUR:Trojan-PSW.MSIL.Agent.gen
MAX malware (ai score=87)
Malwarebytes Spyware.DHTokenGrabber
MaxSecure Trojan.Malware.121218.susgen
McAfee PWS-FCML!4E76DF3913F4
McAfee-GW-Edition PWS-FCML!4E76DF3913F4
MicroWorld-eScan Gen:Variant.Razy.461180
Microsoft Trojan:MSIL/Discord.BM!MTB
Panda Trj/CI.A
Qihoo-360 HEUR/QVM03.0.7A5D.Malware.Gen
Rising Stealer.Discord!1.B7AA (CLOUD)
Sangfor Malware
Sophos Mal/Disteal-B
Tencent Msil.Trojan-qqpass.Qqrob.Pftm
Trapmine malicious.moderate.ml.score
TrendMicro TrojanSpy.MSIL.DISCHOARD.SM
TrendMicro-HouseCall TrojanSpy.MSIL.DISCHOARD.SM
VBA32 TScope.Trojan.MSIL
Webroot W32.Trojan.Gen
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-02-20 03:56:58

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x000013d4 0x00001400 5.296243850467217
.rsrc 0x00004000 0x000005e8 0x00000600 4.3009381579266925
.reloc 0x00006000 0x0000000c 0x00000200 0.08153941234324169

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000040a0 0x0000035c LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_MANIFEST 0x000043fc 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL None

Imports

Library mscoree.dll:
0x402000 _CorExeMain

L!This program cannot be run in DOS mode.
`.rsrc
@.reloc
v4.0.30319
#Strings
DHTokenGrabber.exe
DHTokenGrabber
mscorlib
System
System.Net.Http
<Module>
Grabber
Object
FileInfo
System.IO
Directory
Exists
DirectoryInfo
GetFiles
FileSystemInfo
get_Name
String
EndsWith
get_FullName
ReadAllText
Contains
Concat
FindLdb
FindLog
ReadAllBytes
Encoding
System.Text
get_UTF8
GetString
get_Length
GetToken
IndexOf
Substring
List`1
System.Collections.Generic
AddRange
IEnumerable`1
RemoveAt
ToArray
contents
Program
Process
System.Diagnostics
Environment
GetFolderPath
SpecialFolder
GetProcessesByName
Thread
System.Threading
op_Equality
HttpClient
MultipartFormDataContent
StringContent
HttpContent
get_UserName
PostAsync
Task`1
System.Threading.Tasks
HttpResponseMessage
get_Result
Exception
SendWH
GetStringAsync
WebException
System.Net
Settings
Webhook
.cctor
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
RuntimeCompatibilityAttribute
DebuggableAttribute
DebuggingModes
AssemblyTitleAttribute
System.Reflection
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
ComVisibleAttribute
System.Runtime.InteropServices
GuidAttribute
AssemblyFileVersionAttribute
TargetFrameworkAttribute
System.Runtime.Versioning
Gu)Myxl
WrapNonExceptionThrows
DHTokenGrabber
Copyright
2019
$4b7ec21f-3cd6-4ac1-a85f-c9cce429afeb
1.0.0.0
.NETFramework,Version=v4.6
FrameworkDisplayName
.NET Framework 4.6
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PAPADDINGXXPADDINGPADDINGX
\discord\Local Storage\leveldb\
No valid .ldb or .log file found
Discord
Not found
DiscordHaxx Token Grabber
username
https://media.discordapp.net/attachments/536613741266075649/539446253730398218/discordhaxx_logo.png?width=300&height=300
avatar_url
Token by
Result:
content
https://wtfismyip.com/text
Unable to get IP
https://canary.discordapp.com/api/webhooks/679777514142433291/u80PlHyIp8ROAKNxXiuDcZLGUOpmjdGazuOV7gnBWqy1o-dI_zR1DLIfduib50dYnZjP
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
Nitro Free
FileVersion
1.0.0.0
InternalName
Nitro Free
LegalCopyright
Copyright
2019
LegalTrademarks
OriginalFilename
Nitro Free
ProductName
Assembly product name
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Nitro Free

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 61714 8.8.8.8 53
192.168.56.101 56933 8.8.8.8 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53
192.168.56.101 58485 8.8.8.8 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.