0734ab30d14495702769dedcd306f6d7f829cdd805239f035fc3cc7d34d1bb90
0734ab30d14495702769dedcd306f6d7f829cdd805239f035fc3cc7d34d1bb90.exe
静态报毒
动态报毒
CVE
FAMILY
METATYPE
PLATFORM
TYPE
UNKNOWN
WIN32
TROJAN
WORM
MYDOOM
DACN
0.14
FACILE
1.00
IMCLNet
0.67
MFGraph
0.00
引擎 |
描述 |
特征 |
威胁分数 |
可能家族 |
检测耗时 |
DACN
|
基于动态分析和胶囊网络的可视化恶意软件检测
|
API调用、DLL以及注册表的修改情况
|
0.14
|
Unknown
|
0.06s
|
FACILE
|
利用改进的层次胶囊网络对二进制恶意软件图像进行识别分类
|
二进制图像映射为的灰度图像
|
1.00
|
Unknown
|
0.05s
|
IMCLNet
|
轻量化深度卷积网络模型实现恶意软件家族检测
|
原始二进制映射而成的可视化图像
|
0.67
|
Unknown
|
0.26s
|
MFGraph
|
利用静态特征构建图网络以检测恶意软件
|
原始二进制PE文件的静态特征节点
|
0.00
|
Unknown
|
0.00s
|
查杀引擎 |
查杀结果 |
查杀时间 |
查杀版本 |
Alibaba
|
None
|
20190527
|
0.3.0.5
|
Avast
|
Win32:Mydoom-EG [Trj]
|
20200612
|
18.4.3895.0
|
Baidu
|
Win32.Worm-Email.Mydoom.a
|
20190318
|
1.0.0.2
|
CrowdStrike
|
win/malicious_confidence_100% (D)
|
20190702
|
1.0
|
Kingsoft
|
None
|
20200613
|
2013.8.14.323
|
McAfee
|
W32/Mydoom.c.n@MM
|
20200613
|
6.0.6.653
|
Tencent
|
Worm.Win32.Mydoom.l
|
20200613
|
1.0.0.1
|
一个进程试图延迟分析任务。
(1 个事件)
description |
0734ab30d14495702769dedcd306f6d7f829cdd805239f035fc3cc7d34d1bb90.exe 试图睡眠 139.25 秒,实际延迟分析时间 139.25 秒 |
该二进制文件可能包含加密或压缩数据,表明使用了打包工具
(2 个事件)
section |
{'name': 'UPX1', 'virtual_address': '0x00007000', 'virtual_size': '0x00005000', 'size_of_data': '0x00004600', 'entropy': 7.897902341253568} |
entropy |
7.897902341253568 |
description |
发现高熵的节 |
entropy |
0.8974358974358975 |
description |
此PE文件的整体熵值较高 |
可执行文件使用UPX压缩
(2 个事件)
section |
UPX0 |
description |
节名称指示UPX |
section |
UPX1 |
description |
节名称指示UPX |
与未执行 DNS 查询的主机进行通信
(8 个事件)
host |
15.244.194.45 |
host |
114.114.114.114 |
host |
8.8.8.8 |
host |
24.251.102.227 |
host |
208.32.106.212 |
host |
15.59.125.192 |
host |
15.237.16.213 |
host |
67.109.5.34 |
在 Windows 启动时自我安装以实现自动运行
(1 个事件)
reg_key |
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Traybar |
reg_value |
C:\Windows\lsass.exe |
文件已被 VirusTotal 上 68 个反病毒引擎识别为恶意
(50 out of 68 个事件)
ALYac |
Worm.Mydoom |
APEX |
Malicious |
AVG |
Win32:Mydoom-EG [Trj] |
Acronis |
suspicious |
Ad-Aware |
Worm.Generic.23834 |
AhnLab-V3 |
Win32/Mydoom.worm.22020.H |
Antiy-AVL |
Worm[Email]/Win32.Mydoom |
Arcabit |
Worm.Generic.D5D1A |
Avast |
Win32:Mydoom-EG [Trj] |
Avira |
TR/BAS.Samca.zictf |
Baidu |
Win32.Worm-Email.Mydoom.a |
BitDefender |
Worm.Generic.23834 |
BitDefenderTheta |
AI:Packer.DFC754A81F |
Bkav |
W32.MyDoomLB.Worm |
CAT-QuickHeal |
Worm.Mydoom |
ClamAV |
Win.Worm.Mydoom-5 |
Comodo |
Worm.Win32.Mydoom.Q@308v |
CrowdStrike |
win/malicious_confidence_100% (D) |
Cybereason |
malicious.b902f6 |
Cylance |
Unsafe |
Cynet |
Malicious (score: 100) |
Cyren |
W32/Mydoom.CJDZ-5239 |
DrWeb |
Win32.HLLM.MyDoom.33808 |
ESET-NOD32 |
Win32/Mydoom.Q |
Emsisoft |
Worm.Generic.23834 (B) |
Endgame |
malicious (high confidence) |
F-Prot |
W32/Mydoom.M |
F-Secure |
Email-Worm:W32/Mydoom.gen!A |
FireEye |
Generic.mg.8ccec60b902f6b01 |
Fortinet |
W32/MyDoom.M@mm |
GData |
Worm.Generic.23834 |
Ikarus |
Email-Worm.Win32.Mydoom |
Invincea |
heuristic |
Jiangmin |
I-Worm/Zhelatin.sq |
K7AntiVirus |
EmailWorm ( 0000439f1 ) |
K7GW |
EmailWorm ( 0000439f1 ) |
Kaspersky |
Email-Worm.Win32.Mydoom.l |
MAX |
malware (ai score=83) |
Malwarebytes |
Worm.Agent |
MaxSecure |
Trojan.Malware.300983.susgen |
McAfee |
W32/Mydoom.c.n@MM |
McAfee-GW-Edition |
BehavesLike.Win32.Mydoom.nc |
MicroWorld-eScan |
Worm.Generic.23834 |
Microsoft |
Worm:Win32/Mydoom.L@mm |
NANO-Antivirus |
Trojan.Win32.Mydoom.cuyllc |
Panda |
W32/Mydoom.DN.worm |
Qihoo-360 |
Worm.Win32.Mydoom.A |
Rising |
Worm.Mail.Win32.Mydoom.l (RDMK:cmRtazraxjHf5ENWSePy207SGPLj) |
SUPERAntiSpyware |
Worm.MyDoom |
Sangfor |
Malware |
连接到不再响应请求的 IP 地址(合法服务通常会保持运行)
(6 个事件)
dead_host |
15.244.194.45:1042 |
dead_host |
24.251.102.227:1042 |
dead_host |
208.32.106.212:1042 |
dead_host |
15.59.125.192:1042 |
dead_host |
15.237.16.213:1042 |
dead_host |
67.109.5.34:1042 |
288x288
224x224
192x192
160x160
128x128
96x96
64x64
32x32
👋 欢迎使用 ChatHawk
我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!
🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
PE Compile Time
1970-01-01 08:00:00
PE Imphash
5d02f6de12eb07fb22fe87e05e50d6a0
Sections
Name |
Virtual Address |
Virtual Size |
Size of Raw Data |
Entropy |
UPX0 |
0x00001000 |
0x00006000 |
0x00000000 |
0.0 |
UPX1 |
0x00007000 |
0x00005000 |
0x00004600 |
7.897902341253568 |
.rsrc |
0x0000c000 |
0x00001000 |
0x00000800 |
2.6495694551935207 |
Resources
Name |
Offset |
Size |
Language |
Sub-language |
File type |
RT_ICON |
0x0000c3c4 |
0x00000128 |
LANG_ENGLISH |
SUBLANG_ENGLISH_US |
None |
RT_ICON |
0x0000c3c4 |
0x00000128 |
LANG_ENGLISH |
SUBLANG_ENGLISH_US |
None |
RT_GROUP_ICON |
0x0000c4f0 |
0x00000022 |
LANG_ENGLISH |
SUBLANG_ENGLISH_US |
None |
L!This program cannot be run in DOS mode.
iiiiM,
hPD4e4(
M4M4M4|tld\4MTLD803M(
`XPD;@
IEFrame
ATH_Note
rctrl_renwn
c:\sDec
nSep3ug
/%s, %u
.2u:um
nkmrnetG
{Staiex
Kazaa Lk
ry P6I
W0RAR.v.3Z.od.key#
p 5.0 () C
lcomhdeRe$tvor.
dnsapi%{.dllphlp
w@kPa_9le
{cabu'mass
vGubm{l
crosoftd
the.bgold-Uk;s}ca
"Z+cre
iWKQg^
foG+lc-
zcWxrrsf.)OW
+rr ,ar+
og3gnu
.m{6Ov
;WRdN`do8a0;oa
lekk5bnda
ymav_-!'5b_
8o@d0(
@e*.*KAdtpRN
USERPROFILE
:\yaha0
`v.;D
7e ig;`
lud A
nvQl\+n
:gb puw2D
k3Srb\2aqFqh
5'%i~Ba.=x|
\c$Yf/j
n*ikyQA9
"p3f,FoeSA
\k,Nv EXZrr
naht%w.^
aF:H$Wh'i|s W-1MTc
Ei+!d/.s
Z@vU<$t>?Pl,e%p>0|Bcts@$F
amsQaeA
(`r[a<b
1w-f6}
!b []=-
G_n!CZ]y
lbAs9Y2
Z Lkn,$T.
F:$f]
,YS5dG
;hjX>\lmpt
[STkMdbMHK66-3
L82:tt
+Djg9!?]:Fm1f
Ve-DAE
"MONWz
$<("P"C"8
N&!Vo<SDj=
tQ"K O4"a
x14c;<#n
ABCDEFGHIJK
6LMNOPQRSTUVWXYZ cfgt
jklmFpq
!_vwxyz23456789+/qsX-P
zExp 6.00.26
3IMEO,4P
uTBy@Mfid;
V9Jw,t6-Ty@m-PDt/xP
9Zr="R"s
q-V51O
48X.5sNPs+a^vI?Gp}appmI/%Gk
[mnOf&4nfn-EdAbMv64"DDi{QHL
\HC=u'%Zu>i7bk\2,
'-$uhjp
>a{QUIT
>'PTZ5
-xYIHEL
LO87`+
nTPS&)\\*
|2~^]H+
:.] KlhJ
of.twa
rer\\MicM/s7n5'O'ndYO+CkfCu_+5
/eu]G?;P_6OIX]
8*P7Sh
C_^w7[
_'F$3^D
|lfk=Pj
pxeDSE
c|pLh$;x
%pX+>u
wu&q<GG5Wqoh
Pi6twaire\Miicrosofiit\Winidows\iCurren
itVrsiion\RuH
p$Trl6y
I2\CSW|$
ldcC-o^S
jZY-i`;WR
6-F.;_
$j<_RP3
jh`OJ?b4q
fdg4u|`
YCppcM;u
u?IH+Sn
#<Kf#F
B0 ;xv+PV;tQ
3 @F;|/
wiiniGniet.dll[-
5PEKef9ut_
3$tv3Wj(-
B;POi8/x
6~W"B;}
8@le(7loC
WbPV$v5
\;C}0
>F@JuD.F'
V)$Y;t0Y|
b1?mp ,
K?GOGSU~m3f
ne,<};u<)Zt
Q0^]8PU
{;_t$@SDIC1\
U~R/('Rf4;
}e%Y-b$I0
nGUqtv
!cs_0?b
A$]~% {
pzw{ok
jd7FF6|=~
tVe;?Vd;t$hFBn
*gu;r_ipWl
JS:S>}tG
QSZxOO+N!
W*Xp0,
\<<@t?(T
+CY<Jo=B@9zO
Kyd+7h%
-0vYC1-NO/&<
'xqf,wOy/UH]
tb0UE,
0"8d5^7-S;1YU2vHf
x 0|8<
2+SJNr
F}.RU8
cbf0d_
x5FG['@
hv$~,\l\t3D
Qm{+8
.5a>3K
HyFQ~
J6f2/Xp
?GLa`;
bx3*oo
+KICY`D
h^ddk3T
o';Wto*9
vt\kQS
'UY3SQg
g%vAa+qYDW\&^
]G7F(O
=khY(QR
h~8ZnQ;t
GWSYf;
j2.`h
r2Ojx26hR<P
f+eqkNdw"Z
?I7\d;
@ZA{+[
H_tu(n
}8h+|-;O
;}e;}a;WZ
;~C;~?+b
M-JSQaH
P=/sSu
V|Ehmd
[GdlcO`1vUMp6l:p
jQ4Mhp
>Fzr?0
1EpDMlu[4EP`
djk7&s
04Sof,
,\Micro
,sof\W,
,AB\WAP
,ab bF
,ile NaP,m
#*u=9kY1d
8F,ZF>h=
<U<puY6ql_
buG:uCR<hu
sup>Y<s
btN<db7x
75<w_u
Kfuc['{8
\P#NYsYZ
Pu%8.@+u
#<8P>|f
&P2 jKk
\.ocal 6rSeti\.Qngs-V=TemFp5fr
yJ5fI:F/Wu]
]4Mbk$b
=#Lf$a
LLa7PP1d[
CYRtg-
+0S6-h
.5PfO5
guj,(,
g*<u?m
0<Q'Fzd|s0K
zV5Xme
P9d{Vj.
$Pt7lK
Y`f[5g;Pl
^:#CYx
bD^:3rS
@PA`Wz
/h(ht!h`
JbG!=!!++
~$k/&;t
}d4H1A|(}.
3*HWS.
Y]G2~
_`EPF0
|$3FP;
[mx#(|
pe\#kkV^S&Y
hXPkWPQ
,>kA&5
54oE'J
Z(MrSPPY
lJS^8
#[=9"E@
K8!PxC
Q"FhWQ"Yz72G
^$cG|$l
xo?~E< r8<=t4<+t0<,<
t(<v aULv7GR<Y
Od3GX%dy
,l_HHt
"}5vBR
+D5uUtm1Oh\9
VRG-'(
vm-!+_|
D#NQPWNy
KDDBS}g^Y
1@&o4,;[;
@5~)XZP;
7l[fW!c
bFO><:t9.5
$8&4E?ao8:ua
0}9-G^u
abM*^&
/dV!IV'LYs
-SRg@C
'Y1Hh<
=+(~.*%8g
,X3+(J-
;t..u
|#eXrk}
p&hh.`
9\X]$l
U3B@$`W
JIJHp`m
W{WP'O
RKhc4
ebKtW66
k|v*(\/#Rh
FAS5Cp"Y$
^xW0vvP
Je&"TnQra
+;rMSK%nv
J-TmtQ
$pPrYH;\y
.noj8f
wnYE;r
sm@f=AB
hh6Gfpn|#
|&^bBA+ZS
}^WB_X@
_(5^*'_
tSEFtP7
, aNM~XX
nl9YJ.u+YtV[i
X.Abvl7(d
_xFZ h
WN_KMe
CS;~S[`+{
Qr(`T,oYt>)
lOPuDHL%db
>q70}:
;?| 4l
w__;}a
YP"z'GC
lRtSMpW?xp5
hncaH0
wu)P/xAl
y@*-&@'_Z
!5&#cD
pBmu=i
fgT@EH5
[P71/}
&xE[f;
U`eb{[m&
&T#zW*
P]p=V^^Y[@~
n("F$A
l)>7`03V4i
G]%Djd
bNT!E"
~#6"azp
.l( G;(|
~k;~!,
rjv(kNhu
9t&ET`
lsc:qRH
PGtop&0=
At-^(Eehz{
GF?x\G
HYWWh>x=I
U,TempFNAU
ve;GMGlobalAl
Cas[M$g+
ZgViewOfUnm
vHtked
von)Vaab{
sCopyx
]ESl$lqAP/h
De;y-amc
%[audeChl4M]UByt"A[s
RnIPoi
;i6`H.
3l0Ao'Gg
g`VueE
_um{@0s
d#m{[1
,`BuffA
Low3lGwvr#w
#EAYMbp
GPGWHU
wwwwwww
KERNEL32.DLL
ADVAPI32.dll
MSVCRT.dll
USER32.dll
WS2_32.dll
LoadLibraryA
GetProcAddress
ExitProcess
RegCloseKey
wsprintfA
Q MDh4D
CnBjXB5|6Bq
D^d?D&Q-AQ[
'%E(itME
M}AAfM
B^S?"-3
-2Esq>
{MARrBB&
q@i=#.
):FDi? xCN
_?CQ`FQ
CLD~BMM
N(\Q.{DQkE9
eAP#p_
iNCBD2
A-1^ACE
,.M7Cw
\B|ECR
5@zVDMDS
zB;"$lM
[J*"KZ
r&'z4P
NMN1\g
/ED}tN
jD$M`"
A69DtrBA
?WAzCD:g
*AE@9?
eZ&>>
A(z"A;Z^XD65tD
jSA`_Cr'
=BRb_En
8-AQ Z&
*\'B't
5B);TGd
Z%g%D:,
D-MDm!CdD
#DYY an?
DP}Dd"K
#0T$FB
BT^BzM]:C%<
ELSC#qC&D
04WA}E$
@Z'?sC
EqSDRE
BHO?^~
x<6x)@
,Cmbc_
<zDrgO
d8S2dD
t?|OBt
f.JA<Z9
*(AIB<pBS
f=9MY?s<
*A}c+C
E?$'B9AC-5+C
0$*?A?
4Ql@_M
W?7!ED~
J."R5/
+zl~D?}F8
@?A5}D]A
==+@${
:D?(@P_
pD"(&B
ExC\>D
k`Cf8U
>{FC2e
D}6R!B9
BA1k6A
D5tW=$A|
-~}]%E@EBx
3Y(DRA)k
`ZJ{]Ml/
E":M{D
;z-Qn""|r
K.%AT3ShL9
dnC#(D(}
A E_!@7u
XH"Q%]
AZ#AD:
s"gn|
f_Ep^a}O'eqMQe7
C~eZ]2
eAo$@f
>.n?K_
TCP
No TCP connections recorded.
UDP
Source |
Source Port |
Destination |
Destination Port |
192.168.56.101 |
53179 |
224.0.0.252 |
5355 |
192.168.56.101 |
49642 |
224.0.0.252 |
5355 |
192.168.56.101 |
137 |
192.168.56.255 |
137 |
192.168.56.101 |
61714 |
114.114.114.114 |
53 |
192.168.56.101 |
61714 |
8.8.8.8 |
53 |
192.168.56.101 |
56933 |
8.8.8.8 |
53 |
192.168.56.101 |
138 |
192.168.56.255 |
138 |
192.168.56.101 |
58485 |
114.114.114.114 |
53 |
192.168.56.101 |
58485 |
8.8.8.8 |
53 |
192.168.56.101 |
57665 |
114.114.114.114 |
53 |
HTTP & HTTPS Requests
No HTTP requests performed.
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts
Name |
e3b0c44298fc1c14_lsass.exe
|
Size |
0.0B |
Type |
empty |
MD5 |
d41d8cd98f00b204e9800998ecf8427e |
SHA1 |
da39a3ee5e6b4b0d3255bfef95601890afd80709 |
SHA256 |
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
CRC32 |
00000000 |
ssdeep |
None |
Yara |
None matched
|
VirusTotal |
Search for analysis |
Name |
f12da218799d75d2_gpban1l3.txt
|
Filepath |
C:\Users\Administrator\AppData\Local\Temp\gpban1l3.txt |
Size |
16.9KB |
Processes |
2236 (0734ab30d14495702769dedcd306f6d7f829cdd805239f035fc3cc7d34d1bb90.exe)
|
Type |
data |
MD5 |
0458a8501d55fd423e203b985ddb325c |
SHA1 |
a6f6dee0b3b6b1e4c38cf231906c21bc3f955822 |
SHA256 |
f12da218799d75d2369ecf0ad577cd672d029acaadb79f5ffd9c67051e2b9a5c |
CRC32 |
9371DE75 |
ssdeep |
None |
Yara |
None matched
|
VirusTotal |
Search for analysis |
Sorry! No dropped buffers.