1.1
低危

10292665db9bbaeb624fa913bde89f53e57fa8e084984e53a8be0645b12ab612

10292665db9bbaeb624fa913bde89f53e57fa8e084984e53a8be0645b12ab612.exe

分析耗时

193s

最近分析

372天前

文件大小

26.1KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER UPATRE
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.67
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Downloader-WIH [Trj] 20191004 18.4.3895.0
Baidu Win32.Trojan-Downloader.Waski.a 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20191004 2013.8.14.323
McAfee Upatre-FAAH!534F64D92A4C 20191004 6.0.6.653
Tencent None 20191004 1.0.0.1
静态指标
行为判定
动态指标
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (2 个事件)
section {'name': '.text', 'virtual_address': '0x00001000', 'virtual_size': '0x00001d20', 'size_of_data': '0x00001e00', 'entropy': 6.993157961535865} entropy 6.993157961535865 description 发现高熵的节
entropy 0.3333333333333333 description 此PE文件的整体熵值较高
网络通信
与未执行 DNS 查询的主机进行通信 (2 个事件)
host 114.114.114.114
host 8.8.8.8
文件已被 VirusTotal 上 60 个反病毒引擎识别为恶意 (50 out of 60 个事件)
ALYac Trojan.GenericKD.1958066
APEX Malicious
AVG Win32:Downloader-WIH [Trj]
Acronis suspicious
Ad-Aware Trojan.GenericKD.1958066
AhnLab-V3 Trojan/Win32.Upatre.R126822
Antiy-AVL Trojan[Downloader]/Win32.Upatre
Arcabit Trojan.Generic.D1DE0B2
Avast Win32:Downloader-WIH [Trj]
Avira TR/Rogue.ai.14114.aia
Baidu Win32.Trojan-Downloader.Waski.a
BitDefender Trojan.GenericKD.1958066
Bkav W32.FamVT.GeND.Trojan
CAT-QuickHeal TrojanDwnldr.Upatre.AA4
ClamAV Win.Trojan.Upatre-3457
Comodo TrojWare.Win32.TrojanDownloader.Waski.FA@5j51sa
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.92a4cc
Cylance Unsafe
Cyren W32/Trojan.XENZ-1703
DrWeb Trojan.DownLoader11.60054
ESET-NOD32 Win32/TrojanDownloader.Waski.A
Emsisoft Trojan.GenericKD.1958066 (B)
Endgame malicious (high confidence)
F-Prot W32/Trojan3.LWZ
F-Secure Trojan-Downloader:W32/Upatre.I
FireEye Generic.mg.534f64d92a4cc46a
Fortinet W32/Waski.A!tr
GData Trojan.GenericKD.1958066
Ikarus Trojan-Spy.Zbot
Invincea heuristic
Jiangmin TrojanDownloader.Upatre.cb
K7AntiVirus Trojan-Downloader ( 0048f6391 )
K7GW Trojan-Downloader ( 0048f6391 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=84)
MaxSecure Trojan.Upatre.Gen
McAfee Upatre-FAAH!534F64D92A4C
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.mm
MicroWorld-eScan Trojan.GenericKD.1958066
Microsoft TrojanDownloader:Win32/Upatre.AA
NANO-Antivirus Trojan.Win32.RiskGen.dierlg
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM20.1.5315.Malware.Gen
Rising Trojan.DL.Win32.Upatre.all (CLASSIC)
SentinelOne DFI - Malicious PE
Sophos Troj/Agent-AJUR
Symantec Downloader
TotalDefense Win32/Upatre.PPfcDLC
Trapmine malicious.high.ml.score
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2039-11-16 18:48:59

PE Imphash

da6b168375faf6dc3c71fb750b6f3832

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00001d20 0x00001e00 6.993157961535865
.rdata 0x00003000 0x000009a4 0x00000a00 4.870738937487076
.data 0x00004000 0x00000b3c 0x00000400 3.9147859922140555
.rsrc 0x00005000 0x00002d08 0x00002e00 5.042199268053648

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000053f0 0x000025a8 LANG_NORWEGIAN SUBLANG_NORWEGIAN_BOKMAL None
RT_GROUP_ICON 0x00007998 0x00000014 LANG_NORWEGIAN SUBLANG_NORWEGIAN_BOKMAL None
RT_VERSION 0x00005130 0x000002c0 LANG_NORWEGIAN SUBLANG_NORWEGIAN_BOKMAL None
RT_MANIFEST 0x000079b0 0x00000357 LANG_NORWEGIAN SUBLANG_NORWEGIAN_BOKMAL None

Imports

Library MSVCRT.dll:
0x403050 __p__commode
0x403054 _controlfp
0x403058 _XcptFilter
0x40305c _except_handler3
0x403060 __set_app_type
0x403064 __p__fmode
0x403068 _exit
0x40306c _adjust_fdiv
0x403070 __setusermatherr
0x403074 _initterm
0x403078 __getmainargs
0x40307c _acmdln
0x403080 exit
Library USER32.dll:
0x403090 DestroyWindow
0x403094 PostQuitMessage
0x403098 DefWindowProcA
0x40309c CreateWindowExA
0x4030a0 LoadCursorA
0x4030a4 LoadIconA
0x4030a8 RegisterClassExA
0x4030ac GetMessageA
0x4030b0 TranslateMessage
0x4030b4 DispatchMessageA
0x4030b8 SendMessageA
Library KERNEL32.dll:
0x403010 SetLastError
0x403014 CreateFileA
0x403018 GetTempPathA
0x40301c GetCommandLineW
0x403020 lstrcatA
0x403024 LoadLibraryA
0x403028 GetStringTypeA
0x40302c GetDiskFreeSpaceA
0x403030 IsValidCodePage
0x403034 GetModuleHandleA
0x403038 GetStartupInfoA
0x40303c SetFileAttributesA
0x403040 CopyFileA
0x403044 lstrcpynA
Library GDI32.dll:
0x403008 CreateFontIndirectA
Library COMCTL32.dll:
Library SHELL32.dll:
0x403088 CommandLineToArgvW

L!This program cannot be run in DOS mode.
`.rdata
@.data
hh@h@h
C.S%;U\
HP3PIQ5
.+rbxdkGHeV8)
CFHoeup:?0h+
L$(hdU
PD$(PD$P
L$ D$D
L$$D$D
L$$\$D
L$ D$D
L$0QD$H
L$0D$H
WPT$0RD$P
PD$4PD$\
Q\$h>s
L$$\$D
L$ D$D
L$(D$D
L$,D$D
L$0D$D
L$4D$D
_^]L$0[d
SUVW@V3u)V
taVWL$
AVWAf9
GGEGGEM;r
hD0$h$
DDD@hC
0SZ+$h$0h0@0D@YA@
DhD@$@$
q6w {Jg
cRdrI.
WLC*^
"e3Le
~@h,>o
$UeIvH6yAs&
eqBML:
eGQ1#;
SD]*M.c
E]u&#<<*
sBNpQ]
7b;e&]G
AA+mGh,lH(e
T^mc\j6h8
"g},%ybqi
l0,01 adET
>;b*,uJ
f7iCF Z4e
7r`{ls
gr/t88)
[?h+!0`)
XJxrb4`
?j1-Bf[T
K)[X_J^72;k^>+
k2%upP=Xh+;0
6t~[N~
}l%-Bw
c^f)*tV:-K4}?l
xboIq=nA3,0-Gf 
,Uy>%PP
4?(R<3
6upB?f{?bhjsJ
LjT~W33mQH*d5
$+^:uk<s2e
~/DV8pt
6" @"i:
aebk`UVPXO
]ZE>D!)i.
`S(. H} d
O[}xFcG
:e'6%:8pn
[)%]}v
R7r-KUB
@"1y t
*J*fuC<f>A<W?
@*$=)`
>RXNH."rS'
*c~0_v
h_YDq/7
YnHaV8iV
b,0)C`?0hA
*c~<V<
9;exjLK3!xF
~eyD
[!GOd?8uM
*"[[)[N
Dh$hD@DDh
D0$D0$0D@C
Dhh0@0U
@uHD0@@D
D@jhA*R
&Iua3@0@D$
Q3[h)@
UjhH5@
hSVWe3
EEP5 K@
EPEPEP
0u>"u:Fu
<"u>"u
> vFuj
Dh%\0@
RICHED32.DLL
1 2 3 4 5 6 7 8 9
projects, and I think it is unlikely that will
0f3/f3f
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
MSVCRT.dll
_controlfp
DispatchMessageA
TranslateMessage
GetMessageA
RegisterClassExA
LoadIconA
LoadCursorA
CreateWindowExA
DefWindowProcA
PostQuitMessage
SendMessageA
DestroyWindow
USER32.dll
lstrcpynA
lstrcatA
GetCommandLineW
GetTempPathA
CreateFileA
SetLastError
LoadLibraryA
SetFileAttributesA
CopyFileA
SetEnvironmentVariableA
GetStringTypeA
GetDiskFreeSpaceA
IsValidCodePage
GetModuleHandleA
GetStartupInfoA
KERNEL32.dll
CreateFontIndirectA
GDI32.dll
InitCommonControlsEx
COMCTL32.dll
CommandLineToArgvW
SHELL32.dll
time to go
far far away
very speedy
mesatamy
eclass
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
RICHEDIT
"~!JO29
KIKI2,
xxxyyy
222222J<z2J<220
1 22222220
8 ;!;!;!8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 6
9!;!;!;!;!;!;!;!;!;!;!;!;!;!;!;!;!;!;!;!8 8 8 8 8 8 ;!;!;!9!~CX
9!;!\D\D\D\D\DV>W@V>V>V>V>V>V>V>V>V>V>V>V>V>V>V>V>V>V>V>;!;!Na
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="x86" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><application xmlns="urn:schemas-microsoft-com:asm.v3"><windowsSettings><ms_windowsSettings:dpiAware xmlns:ms_windowsSettings="http://schemas.microsoft.com/SMI/2005/WindowsSettings" xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</ms_windowsSettings:dpiAware></windowsSettings></application></assembly>
cuperAV
VS_VERSION_INFO
StringFileInfo
13F9C6A6
FileDescription
Lab Trab Nab
FileVersion
1.0.0.105
LegalCopyright
Copyright 2011-2014 all authors (GPLv3)
OriginalFilename
trabnab.exe
ProductName
Lab Trab Nab
ProductVersion
1.0.0.105
CompanyName
Lab Trab Nab Inc.
VarFileInfo
Translation
C:\Users\Melissa.ROBERTCUSSENAND\AppData\Local\Temp\Temp1_BACS_Transfer_JS5345435_pdf.zip\BACS_Transfer_JS5345435_pdf.exe
C:\e83cbd9728b2833a5de228412b76c4c1eab2e65ef3808e31e11552b771a8260d
C:\698929480729fc5425e9302527a4d5a40585b4a55c1581660c574cde7a99b8d4
c:\mapp_start_folder\snowball.exe
C:\d06bd0101e5ab034847f4d6f0ba704faef74f6e21046ce270715a80a9ca1920c
C:\d257cab757c7caa3a11f742b45640fde1f8c5d4336ade07f9f7486e20ecf541d
C:\87fc5004117981124155b9d859eed18cc9987cf8dae3a2222a75fe725b7fa623
C:\0183daac361e980562e9bd29a7f81eeaa6c346aadf060448122d85771e94dbb7
C:\5240c668d67e1e44da4a367e1e2ce0135f19c6c3accaf51f41cec2d8bc2dd8ea
C:\d0b104343ef3fb7c8d593684c5eee833866fd172eedc3ee8f68d6f8e36836a85
C:\Users\Virtual\AppData\Local\Temp\a08d912c9e2a404b75f6371ef3594428b6956cda9da1868b347cd7e9203f1804.exe
C:\Users\admin\Downloads\mczyh.exe
C:\7521a612382085d512e1251c86ca4ad9922330ddc891be9352f044fa2ffb4f8a
C:\37c53e0bd22ca21479c7efdbff05cf03ba83e3dfb1980416d92c4bbbbf002523
C:\04ad407e63dab6bfbbd1682a53cacaedab29e54c3397b43c99d1696747176e51
C:\Users\admin\Downloads\mczyh.exe
C:\b8f5423199c853a36e5e5c3e98f0278b11ed24d107bc0cbabd7976879db068a7
C:\Users\admin\Downloads\mczyh.exe
C:\d663c1ca8be3f12e13c63cba79352b9415d3b88d63d2213f91acc475f545ac00
C:\Users\admin\Downloads\mczyh.exe
C:\02070fddd4e76d6b3c8ead04f6fac1e08a856b41037adb9403ef37b136f6a4c6

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 61714 8.8.8.8 53
192.168.56.101 56933 8.8.8.8 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53
192.168.56.101 58485 8.8.8.8 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.