3.6
中危

668ec5b9759f0349cc79113c4d2bb62ebf2239de79532f97248b242df8608a3c

9a138e44871c402fa2d3067dc160a4e8.exe

分析耗时

78s

最近分析

文件大小

1.4MB
静态报毒 动态报毒 100% 8ERM9R0MSX84XWUHUPMG AI SCORE=80 AIDETECTVM ARTEMIS ATTRIBUTE BFVU BLADABINDI CONFIDENCE CRYPTINJECT DABQ DELF GDSDA GENERIC@ML HIGH CONFIDENCE HIGHCONFIDENCE HSRZ LQZKS MALWARE2 MALWARE@#AIE3EG5Y2B6Q RDML SCORE STATIC AI SUSPICIOUS PE UNSAFE WPW@AOFV4CGG 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Artemis!9A138E44871C 20201211 6.0.6.653
Alibaba Backdoor:MSIL/Bladabindi.5b2353a8 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Malware-gen 20201210 21.1.5827.0
Tencent Win32.Virus.Delf.Hsrz 20201211 1.0.0.1
Kingsoft 20201211 2017.9.26.565
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
静态指标
The executable contains unknown PE section names indicative of a packer (could be a false positive) (5 个事件)
section CODE
section DATA
section BSS
section .Basic0
section .Basic1
One or more processes crashed (3 个事件)
Time & API Arguments Status Return Repeated
1619781067.748167
__exception__
stacktrace:

                
            
            
            
registers.esp: 1636180
registers.edi: 1638200
registers.eax: 1447909480
registers.ebp: 1638240
registers.edx: 22104
registers.ebx: 0
registers.esi: 1638228
registers.ecx: 10
exception.instruction_r: ed e9 65 7d 00 00 6b 4b 8a a5 25 f4 71 74 ca d8
exception.instruction: in eax, dx
exception.module: 9a138e44871c402fa2d3067dc160a4e8.exe
exception.exception_code: 0xc0000096
exception.offset: 3075677
exception.address: 0x6eee5d
success 0 0
1619781067.748167
__exception__
stacktrace:

                
            
            
            
registers.esp: 1636180
registers.edi: 1638200
registers.eax: 354351307
registers.ebp: 1638240
registers.edx: 78
registers.ebx: 0
registers.esi: 1638228
registers.ecx: 10
exception.instruction_r: 90 e8 73 98 f9 ff 8b 6c 24 04 9c 68 18 32 5d 19
exception.instruction: nop
exception.module: 9a138e44871c402fa2d3067dc160a4e8.exe
exception.exception_code: 0x80000004
exception.offset: 3081876
exception.address: 0x6f0694
success 0 0
1619781067.748167
__exception__
stacktrace:

                
            
            
            
registers.esp: 1636180
registers.edi: 1638200
registers.eax: 591595
registers.ebp: 1638240
registers.edx: 395049983
registers.ebx: 133120
registers.esi: 1638228
registers.ecx: 3738837507
exception.instruction_r: 68 15 ad 3b ab 60 e8 b8 e5 fe ff 8b 44 24 2c ff
exception.instruction: push 0xab3bad15
exception.module: 9a138e44871c402fa2d3067dc160a4e8.exe
exception.exception_code: 0x80000004
exception.offset: 2792513
exception.address: 0x6a9c41
success 0 0
行为判定
动态指标
Foreign language identified in PE resource (2 个事件)
name RT_ICON language LANG_TURKISH offset 0x003011a4 filetype dBase IV DBT of @.DBF, block length 8192, next free block index 40 sublanguage SUBLANG_DEFAULT size 0x000010a8
name RT_ICON language LANG_TURKISH offset 0x003011a4 filetype dBase IV DBT of @.DBF, block length 8192, next free block index 40 sublanguage SUBLANG_DEFAULT size 0x000010a8
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.99111144678524 section {'size_of_data': '0x00158800', 'virtual_address': '0x001a6000', 'entropy': 7.99111144678524, 'name': '.Basic1', 'virtual_size': '0x00158705'} description A section with a high entropy has been found
entropy 0.9927953890489913 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (1 个事件)
host 172.217.24.14
Detects VMWare through the in instruction feature (1 个事件)
Time & API Arguments Status Return Repeated
1619781067.748167
__exception__
stacktrace:

                
            
            
            
registers.esp: 1636180
registers.edi: 1638200
registers.eax: 1447909480
registers.ebp: 1638240
registers.edx: 22104
registers.ebx: 0
registers.esi: 1638228
registers.ecx: 10
exception.instruction_r: ed e9 65 7d 00 00 6b 4b 8a a5 25 f4 71 74 ca d8
exception.instruction: in eax, dx
exception.module: 9a138e44871c402fa2d3067dc160a4e8.exe
exception.exception_code: 0xc0000096
exception.offset: 3075677
exception.address: 0x6eee5d
success 0 0
File has been identified by 48 AntiVirus engines on VirusTotal as malicious (48 个事件)
Bkav W32.AIDetectVM.malware2
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Trojan.Heur.FU.wPW@aOFv4CgG
FireEye Generic.mg.9a138e44871c402f
McAfee Artemis!9A138E44871C
Cylance Unsafe
Zillya Backdoor.Bladabindi.Win32.18495
Sangfor Malware
K7AntiVirus Riskware ( 0040eff71 )
Alibaba Backdoor:MSIL/Bladabindi.5b2353a8
K7GW Riskware ( 0040eff71 )
Cybereason malicious.4871c4
Arcabit Trojan.Heur.FU.EBD0D2
BitDefenderTheta AI:Packer.0D33B3A51F
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:Malware-gen
Kaspersky Backdoor.MSIL.Bladabindi.bfvu
BitDefender Gen:Trojan.Heur.FU.wPW@aOFv4CgG
Paloalto generic.ml
Tencent Win32.Virus.Delf.Hsrz
Ad-Aware Gen:Trojan.Heur.FU.wPW@aOFv4CgG
Sophos Mal/Generic-S
Comodo Malware@#aie3eg5y2b6q
F-Secure Trojan.TR/AD.Bladabindi.lqzks
VIPRE Trojan.Win32.Generic!BT
McAfee-GW-Edition BehavesLike.Win32.Generic.tc
Emsisoft Gen:Trojan.Heur.FU.wPW@aOFv4CgG (B)
Ikarus Virus.Win32.Delf
Jiangmin Backdoor.MSIL.dabq
Avira TR/AD.Bladabindi.lqzks
Antiy-AVL Trojan[Backdoor]/MSIL.Bladabindi
Gridinsoft Trojan.Heur!.03292121
Microsoft Trojan:Win32/CryptInject!ml
AegisLab Trojan.Win32.Malicious.4!c
ZoneAlarm Backdoor.MSIL.Bladabindi.bfvu
GData Gen:Trojan.Heur.FU.wPW@aOFv4CgG
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.Bladabindi.C4115305
Acronis suspicious
MAX malware (ai score=80)
ESET-NOD32 a variant of Win32/Delf.NBX
Rising Trojan.Generic@ML.89 (RDML:2/8eRm9r0msx84xwuHuPMg)
SentinelOne Static AI - Suspicious PE
AVG Win32:Malware-gen
Panda Trj/GdSda.A
CrowdStrike win/malicious_confidence_100% (W)
Qihoo-360 Generic/Backdoor.a4e
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x6f4000 GetVersion
0x6f4004 GetVersionExA
0x6f4008 GetVersion
0x6f400c GetConsoleOutputCP
Library user32.dll:
0x6f4014 RegisterClassA
Library advapi32.dll:
0x6f401c RegOpenKeyExA
Library oleaut32.dll:
0x6f4024 SysAllocStringLen
Library version.dll:
0x6f402c VerQueryValueA
Library gdi32.dll:
0x6f4034 SaveDC
Library ole32.dll:
0x6f403c CoCreateInstance
Library comctl32.dll:
0x6f4044 ImageList_EndDrag
Library shell32.dll:
0x6f404c SHGetDesktopFolder
Library wininet.dll:
0x6f4054 InternetCloseHandle
Library wsock32.dll:
0x6f405c gethostname
Library netapi32.dll:
0x6f4064 Netbios
Library kernel32.dll:
0x6f406c GetModuleFileNameW
Library kernel32.dll:
0x6f4074 GetModuleHandleA
0x6f4078 LoadLibraryA
0x6f407c LocalAlloc
0x6f4080 LocalFree
0x6f4084 GetModuleFileNameA
0x6f4088 ExitProcess

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51808 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 55368 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 65004 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 51809 239.255.255.250 3702
192.168.56.101 55369 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 62194 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.