查杀引擎 | 查杀结果 | 查杀时间 | 查杀版本 |
---|---|---|---|
McAfee | GenericRXGW-DA!9038B87EA98F | 20190712 | 6.0.6.653 |
Alibaba | Trojan:Win32/Woool.4765bca1 | 20190527 | 0.3.0.5 |
Baidu | 20190318 | 1.0.0.2 | |
Avast | Win32:Trojan-gen | 20190712 | 18.4.3895.0 |
Tencent | Win32.Trojan.Spy.Hprk | 20190712 | 1.0.0.1 |
Kingsoft | 20190712 | 2013.8.14.323 | |
CrowdStrike | win/malicious_confidence_100% (W) | 20190212 | 1.0 |
section | .itext |
section | .vmp0 |
section | .vmp1 |
resource name | DLL |
request | GET http://anti.fhdlq.net/Drv/ls.txt |
name | DLL | language | LANG_CHINESE | offset | 0x0058a37c | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x00020600 | ||||||||||||||||||
name | DLL | language | LANG_CHINESE | offset | 0x0058a37c | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x00020600 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | offset | 0x00493adc | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x000010a8 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | offset | 0x00494b84 | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x00000014 | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | offset | 0x00494b98 | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x00000284 | ||||||||||||||||||
name | RT_MANIFEST | language | LANG_CHINESE | offset | 0x00494e1c | filetype | XML 1.0 document, ASCII text, with CRLF line terminators | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x0000015d |
Time & API | Arguments | Status | Return | Repeated |
---|---|---|---|---|
1620969957.715001 Process32NextW |
process_name:
贛矺
snapshot_handle: 0x00000228 process_identifier: 11534336 |
failed | 0 | 0 |
entropy | 7.993229826735768 | section | {'size_of_data': '0x00270a00', 'virtual_address': '0x00220000', 'entropy': 7.993229826735768, 'name': '.vmp1', 'virtual_size': '0x002709f2'} | description | A section with a high entropy has been found | |||||||||
entropy | 0.9950219036240542 | description | Overall entropy of this PE file is high |
Time & API | Arguments | Status | Return | Repeated |
---|---|---|---|---|
1620969957.559001 LookupPrivilegeValueW |
system_name:
privilege_name: SeDebugPrivilege |
success | 1 | 0 |
section | .vmp0 | description | Section name indicates VMProtect | ||||||
section | .vmp1 | description | Section name indicates VMProtect |
host | 172.217.24.14 |
file | \??\VBoxGuest |
file | \??\VBoxMiniRdrDN |
dll | C:\Windows\system32\VBoxMRXNP.dll |
MicroWorld-eScan | Gen:Variant.Ulise.25372 |
CAT-QuickHeal | Trojan.Tiggre |
McAfee | GenericRXGW-DA!9038B87EA98F |
Cylance | Unsafe |
Zillya | Trojan.TDSS.Win32.46844 |
Alibaba | Trojan:Win32/Woool.4765bca1 |
K7GW | Trojan ( 7000000f1 ) |
K7AntiVirus | Trojan ( 7000000f1 ) |
Arcabit | Trojan.Ulise.D631C |
TrendMicro | TROJ_GEN.R015C0PGB19 |
Symantec | Trojan.Gen.MBT |
Avast | Win32:Trojan-gen |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Gen:Variant.Ulise.25372 |
Paloalto | generic.ml |
ViRobot | Trojan.Win32.Z.Ulise.2963859 |
Tencent | Win32.Trojan.Spy.Hprk |
Endgame | malicious (high confidence) |
Emsisoft | Gen:Variant.Ulise.25372 (B) |
F-Secure | Trojan.TR/Spy.Banker.Gen7 |
DrWeb | Trojan.DownLoader27.24109 |
VIPRE | Trojan.Win32.Generic!BT |
Invincea | heuristic |
McAfee-GW-Edition | BehavesLike.Win32.Generic.vc |
FireEye | Generic.mg.9038b87ea98f065c |
Sophos | Mal/Generic-S |
SentinelOne | DFI - Malicious PE |
Avira | TR/Spy.Banker.Gen7 |
Antiy-AVL | Trojan[GameThief]/Win32.OnLineGames |
Microsoft | Trojan:Win32/Wacatac.B!ml |
AegisLab | Trojan.Multi.Generic.4!c |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Gen:Variant.Ulise.25372 |
AhnLab-V3 | Malware/Win32.RL_Generic.R259819 |
Acronis | suspicious |
VBA32 | Trojan.Downloader |
ALYac | Gen:Variant.Ulise.25372 |
MAX | malware (ai score=100) |
Ad-Aware | Gen:Variant.Ulise.25372 |
ESET-NOD32 | Win32/Woool.F |
TrendMicro-HouseCall | TROJ_GEN.R015C0PGB19 |
Rising | Trojan.Dynamer!8.3A0 (TFE:4:tF3mYVVYcMJ) |
Yandex | Trojan.Agent!tmQdVR6ZrRM |
Ikarus | Trojan.Spy.Banker |
Fortinet | Riskware/GameThief0C21 |
AVG | Win32:Trojan-gen |
Cybereason | malicious.ea98f0 |
Panda | Trj/Genetic.gen |
CrowdStrike | win/malicious_confidence_100% (W) |
Qihoo-360 | Win32/Trojan.600 |
No hosts contacted.
Name | Response | Post-Analysis Lookup |
---|---|---|
time.windows.com |
A 20.189.79.72
CNAME time.microsoft.akadns.net |
|
teredo.ipv6.microsoft.com | ||
dns.msftncsi.com | AAAA fd3e:4f5a:5b81::1 | 131.107.255.255 |
dns.msftncsi.com | A 131.107.255.255 | 131.107.255.255 |
anti.fhdlq.net | A 165.3.87.138 | 165.3.87.138 |
Source | Source Port | Destination | Destination Port |
---|---|---|---|
192.168.56.101 | 49177 | 165.3.87.138 anti.fhdlq.net | 80 |
Source | Source Port | Destination | Destination Port |
---|---|---|---|
192.168.56.101 | 49713 | 114.114.114.114 | 53 |
192.168.56.101 | 50002 | 114.114.114.114 | 53 |
192.168.56.101 | 57756 | 114.114.114.114 | 53 |
192.168.56.101 | 57874 | 114.114.114.114 | 53 |
192.168.56.101 | 58367 | 114.114.114.114 | 53 |
192.168.56.101 | 62318 | 114.114.114.114 | 53 |
192.168.56.101 | 137 | 192.168.56.255 | 137 |
192.168.56.101 | 138 | 192.168.56.255 | 138 |
192.168.56.101 | 123 | 20.189.79.72 time.windows.com | 123 |
192.168.56.101 | 49235 | 224.0.0.252 | 5355 |
192.168.56.101 | 50534 | 224.0.0.252 | 5355 |
192.168.56.101 | 51963 | 224.0.0.252 | 5355 |
192.168.56.101 | 53237 | 224.0.0.252 | 5355 |
192.168.56.101 | 53657 | 224.0.0.252 | 5355 |
192.168.56.101 | 56804 | 224.0.0.252 | 5355 |
192.168.56.101 | 62191 | 224.0.0.252 | 5355 |
192.168.56.101 | 63429 | 224.0.0.252 | 5355 |
192.168.56.101 | 1900 | 239.255.255.250 | 1900 |
192.168.56.101 | 50003 | 239.255.255.250 | 3702 |
192.168.56.101 | 50005 | 239.255.255.250 | 3702 |
URI | Data |
---|---|
http://anti.fhdlq.net/Drv/ls.txt | GET /Drv/ls.txt HTTP/1.1 Host: anti.fhdlq.net Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: identity User-Agent: Mozilla/3.0 (compatible; Indy Library) |
No ICMP traffic performed.
No IRC requests performed.
No Suricata Alerts
No Suricata TLS
No Snort Alerts