| 查杀引擎 | 查杀结果 | 查杀时间 | 查杀版本 |
|---|---|---|---|
| Alibaba | None | 20190527 | 0.3.0.5 |
| Avast | Win32:Malware-gen | 20190926 | 18.4.3895.0 |
| Baidu | None | 20190318 | 1.0.0.2 |
| CrowdStrike | win/malicious_confidence_90% (D) | 20190702 | 1.0 |
| Kingsoft | None | 20190926 | 2013.8.14.323 |
| McAfee | BackDoor-ESK | 20190926 | 6.0.6.653 |
| Tencent | None | 20190926 | 1.0.0.1 |
| section | 353iggif |
| section | 3ec2itgb |
| section | 38h5rfen |
| section | {'name': '3ec2itgb', 'virtual_address': '0x0000a000', 'virtual_size': '0x00002000', 'size_of_data': '0x00001a00', 'entropy': 7.547400585476299} | entropy | 7.547400585476299 | description | 发现高熵的节 | |||||||||
| entropy | 0.8125 | description | 此PE文件的整体熵值较高 | |||||||||||
| host | 114.114.114.114 | |||
| host | 8.8.8.8 | |||
| ALYac | Generic.Mydoom.AC4E1A72 |
| APEX | Malicious |
| AVG | Win32:Malware-gen |
| Acronis | suspicious |
| Ad-Aware | Generic.Mydoom.AC4E1A72 |
| AhnLab-V3 | Dropper/Win32.Mudrop.R65624 |
| Antiy-AVL | Trojan[Dropper]/Win32.Daws |
| Arcabit | Generic.Mydoom.AC4E1A72 |
| Avast | Win32:Malware-gen |
| Avira | BDS/Backdoor.Gen |
| BitDefender | Generic.Mydoom.AC4E1A72 |
| ClamAV | Win.Worm.Mydoom-6840397-0 |
| Comodo | Worm.Win32.Autorun.~dy19@2vntd6 |
| CrowdStrike | win/malicious_confidence_90% (D) |
| Cylance | Unsafe |
| Cyren | W32/Trojan.IXSI-2812 |
| DrWeb | Trojan.Siggen5.62477 |
| ESET-NOD32 | a variant of Win32/Agent.NHB |
| Emsisoft | Generic.Mydoom.AC4E1A72 (B) |
| Endgame | malicious (high confidence) |
| F-Prot | W32/Trojan2.MWJB |
| F-Secure | Backdoor.BDS/Backdoor.Gen |
| FireEye | Generic.mg.6484fbc07edbfd7d |
| Fortinet | W32/AutoRun.BJD!worm |
| GData | Generic.Mydoom.AC4E1A72 |
| Ikarus | Worm.Win32.AutoRun |
| Invincea | heuristic |
| Jiangmin | Worm/AutoRun.trl |
| K7AntiVirus | Trojan ( 001183dd1 ) |
| K7GW | Trojan ( 001183dd1 ) |
| Kaspersky | HEUR:Trojan.Win32.Generic |
| MAX | malware (ai score=83) |
| McAfee | BackDoor-ESK |
| McAfee-GW-Edition | BehavesLike.Win32.Backdoor.xh |
| MicroWorld-eScan | Generic.Mydoom.AC4E1A72 |
| Microsoft | Trojan:Win32/Fuerboos.D!cl |
| NANO-Antivirus | Trojan.Win32.AutoRun.bbmnol |
| Panda | Trj/Genetic.gen |
| Qihoo-360 | HEUR/QVM31.1.2627.Malware.Gen |
| Rising | Worm.Agent!8.25 (TFE:5:vYQYvT3t4AO) |
| Sophos | Mal/Behav-104 |
| Symantec | W32.Mydoom.B@mm |
| TotalDefense | Win32/ASuspect.HHAGR |
| VBA32 | BScope.Trojan-Spy.Zbot |
| ViRobot | Worm.Win32.Autorun.8704.G |
| Yandex | Worm.AutoRun!cad1tVlxORA |
| Zillya | Worm.AutoRun.Win32.20537 |
| ZoneAlarm | HEUR:Trojan.Win32.Generic |
| Name | Virtual Address | Virtual Size | Size of Raw Data | Entropy |
|---|---|---|---|---|
| 353iggif | 0x00001000 | 0x00009000 | 0x00000000 | 0.0 |
| 3ec2itgb | 0x0000a000 | 0x00002000 | 0x00001a00 | 7.547400585476299 |
| 38h5rfen | 0x0000c000 | 0x00001000 | 0x00000600 | 4.231484467160695 |
| Ordinal | Address | Name |
|---|---|---|
| 1 | 0x10001c8c | AcceptThread@4 |
| 2 | 0x10006054 | AuthLogin |
| 3 | 0x100060c4 | AuthPass |
| 4 | 0x100011db | CreateConnectStruct |
| 5 | 0x10001f57 | Get_Reg_SZ |
| 6 | 0x10001bbe | Socks5Accept |
| 7 | 0x10001a5b | Socks5Auth |
| 8 | 0x1000153e | Socks5CmdIsSupported |
| 9 | 0x100017df | Socks5GetCmd |
| 10 | 0x1000140f | Socks5SendCode |
| 11 | 0x10001451 | Socks5ServConnect |
| 12 | 0x100012e4 | SocksPipe@4 |
| 13 | 0x1000274e | Write_REG_SZ |
| 14 | 0x100011bd | _malloc |
| 15 | 0x10002209 | add_system_direcroty |
| 16 | 0x1000237f | autostart_bot |
| 17 | 0x10002806 | copy_autoinf |
| 18 | 0x10002c6c | copy_filez |
| 19 | 0x10001180 | create_thread |
| 20 | 0x1000271b | filetyt |
| 21 | 0x10002b9c | get_dword |
| 22 | 0x10006094 | hDllInstance |
| 23 | 0x10002a16 | mutex_check |
| 24 | 0x100060a4 | name_exe |
| 25 | 0x10001f26 | rot13 |
| 26 | 0x10001e04 | rot13c |
| 27 | 0x10002ea8 | run_another@4 |
| 28 | 0x10002cef | run_flash@4 |
| 29 | 0x10002a60 | run_process@4 |
| 30 | 0x100029b8 | run_reestr@4 |
| 31 | 0x1000157e | socks5_exec |
| 32 | 0x1000128d | sread |
| 33 | 0x100024a2 | sss_rans |
| 34 | 0x10001236 | swrite |
| 35 | 0x10002020 | xproxy_th@4 |
| 36 | 0x10002278 | xsocks5 |
| 37 | 0x10001dd8 | xstrchr |