213a6a864cb080d9d70e4fe8fc4408a79a454d3667e0300b698fdb82cd3b35cc
213a6a864cb080d9d70e4fe8fc4408a79a454d3667e0300b698fdb82cd3b35cc.exe
静态报毒
动态报毒
CVE
FAMILY
METATYPE
PLATFORM
TYPE
UNKNOWN
WIN32
TROJAN
DROPPER
DAWS
DACN
0.12
FACILE
1.00
IMCLNet
0.51
MFGraph
0.00
引擎 |
描述 |
特征 |
威胁分数 |
可能家族 |
检测耗时 |
DACN
|
基于动态分析和胶囊网络的可视化恶意软件检测
|
API调用、DLL以及注册表的修改情况
|
0.12
|
Unknown
|
0.05s
|
FACILE
|
利用改进的层次胶囊网络对二进制恶意软件图像进行识别分类
|
二进制图像映射为的灰度图像
|
1.00
|
Unknown
|
0.04s
|
IMCLNet
|
轻量化深度卷积网络模型实现恶意软件家族检测
|
原始二进制映射而成的可视化图像
|
0.51
|
Unknown
|
0.17s
|
MFGraph
|
利用静态特征构建图网络以检测恶意软件
|
原始二进制PE文件的静态特征节点
|
0.00
|
Unknown
|
0.00s
|
查杀引擎 |
查杀结果 |
查杀时间 |
查杀版本 |
Alibaba
|
None
|
20190527
|
0.3.0.5
|
Avast
|
Sf:Crypt-IF [Trj]
|
20200418
|
18.4.3895.0
|
Baidu
|
None
|
20190318
|
1.0.0.2
|
CrowdStrike
|
win/malicious_confidence_80% (D)
|
20190702
|
1.0
|
Kingsoft
|
None
|
20200418
|
2013.8.14.323
|
McAfee
|
GenericRXHD-EO!9CE62E432284
|
20200417
|
6.0.6.653
|
Tencent
|
Malware.Win32.Gencirc.10b0c603
|
20200418
|
1.0.0.1
|
该二进制文件可能包含加密或压缩数据,表明使用了打包工具
(2 个事件)
section |
{'name': 'UPX1', 'virtual_address': '0x00007000', 'virtual_size': '0x00003000', 'size_of_data': '0x00002200', 'entropy': 7.612717725752293} |
entropy |
7.612717725752293 |
description |
发现高熵的节 |
entropy |
0.7727272727272727 |
description |
此PE文件的整体熵值较高 |
可执行文件使用UPX压缩
(2 个事件)
section |
UPX0 |
description |
节名称指示UPX |
section |
UPX1 |
description |
节名称指示UPX |
与未执行 DNS 查询的主机进行通信
(1 个事件)
文件已被 VirusTotal 上 56 个反病毒引擎识别为恶意
(50 out of 56 个事件)
ALYac |
Trojan.Agent.DQRC |
APEX |
Malicious |
AVG |
Sf:Crypt-IF [Trj] |
Acronis |
suspicious |
Ad-Aware |
Trojan.Agent.DQRC |
AhnLab-V3 |
Trojan/Win32.Daws.R259333 |
Antiy-AVL |
Trojan/Win32.TSGeneric |
Arcabit |
Trojan.Agent.DQRC |
Avast |
Sf:Crypt-IF [Trj] |
Avira |
TR/Dropper.Gen |
BitDefender |
Trojan.Agent.DQRC |
BitDefenderTheta |
AI:Packer.92B806171F |
Bkav |
W32.AIDetectVM.malware2 |
CAT-QuickHeal |
TrojanDropper.Daws |
Comodo |
Worm.Win32.VBNA.~gen@1qlvkj |
CrowdStrike |
win/malicious_confidence_80% (D) |
Cybereason |
malicious.32284c |
Cylance |
Unsafe |
Cyren |
W32/Daws.E.gen!Eldorado |
DrWeb |
Trojan.Siggen4.20010 |
ESET-NOD32 |
Win32/VB.QMS |
Emsisoft |
Trojan.Agent.DQRC (B) |
Endgame |
malicious (moderate confidence) |
F-Prot |
W32/Daws.E.gen!Eldorado |
F-Secure |
Trojan.TR/Dropper.Gen |
FireEye |
Generic.mg.9ce62e432284c99a |
Fortinet |
W32/Daws.EHPN!tr |
GData |
Trojan.Agent.DQRC |
Ikarus |
Trojan.Win32.VB |
Invincea |
heuristic |
Jiangmin |
TrojanDropper.Daws.ijr |
K7AntiVirus |
P2PWorm ( 0055e3ea1 ) |
K7GW |
P2PWorm ( 0055e3ea1 ) |
Kaspersky |
Trojan-Dropper.Win32.Daws.ehpn |
MAX |
malware (ai score=88) |
Malwarebytes |
Trojan.Dropper |
MaxSecure |
Trojan.Malware.300983.susgen |
McAfee |
GenericRXHD-EO!9CE62E432284 |
McAfee-GW-Edition |
GenericRXHD-EO!9CE62E432284 |
MicroWorld-eScan |
Trojan.Agent.DQRC |
Microsoft |
Trojan:Win32/Wacatac.C!ml |
NANO-Antivirus |
Trojan.Win32.VB.eljjgx |
Qihoo-360 |
HEUR/QVM18.1.A467.Malware.Gen |
Rising |
Trojan.Daws!8.10F8F (RDMK:cmRtazpMf14YChZQQfmE046+ArnV) |
SUPERAntiSpyware |
Trojan.Agent/Generic |
Sangfor |
Malware |
SentinelOne |
DFI - Malicious PE |
Sophos |
Mal/VB-AQV |
Tencent |
Malware.Win32.Gencirc.10b0c603 |
Trapmine |
malicious.moderate.ml.score |
288x288
224x224
192x192
160x160
128x128
96x96
64x64
32x32
👋 欢迎使用 ChatHawk
我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!
🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
PE Compile Time
2012-05-19 06:40:52
PE Imphash
0147fa67fef26cfd754ec08cec0f1c9b
Sections
Name |
Virtual Address |
Virtual Size |
Size of Raw Data |
Entropy |
UPX0 |
0x00001000 |
0x00006000 |
0x00000000 |
0.0 |
UPX1 |
0x00007000 |
0x00003000 |
0x00002200 |
7.612717725752293 |
.rsrc |
0x0000a000 |
0x00001000 |
0x00000a00 |
3.224628465030459 |
Resources
Name |
Offset |
Size |
Language |
Sub-language |
File type |
RT_ICON |
0x0000a5bc |
0x00000128 |
LANG_NEUTRAL |
SUBLANG_NEUTRAL |
None |
RT_ICON |
0x0000a5bc |
0x00000128 |
LANG_NEUTRAL |
SUBLANG_NEUTRAL |
None |
RT_ICON |
0x0000a5bc |
0x00000128 |
LANG_NEUTRAL |
SUBLANG_NEUTRAL |
None |
RT_GROUP_ICON |
0x0000a6e8 |
0x00000030 |
LANG_NEUTRAL |
SUBLANG_NEUTRAL |
None |
RT_VERSION |
0x0000a71c |
0x000001c0 |
LANG_ENGLISH |
SUBLANG_ENGLISH_US |
None |
RT_DLGINCLUDE |
0x0000a8e0 |
0x00000024 |
LANG_ICELANDIC |
SUBLANG_DEFAULT |
None |
L!This program cannot be run in DOS mode.
iiidiRichi
<Hr,Kb
nD&dwT
^D'_]qqW=R
`@#%dD,{m-
ZM_Zq|
FUZ%R;
W$&Xd<*1"ORrJY}&
Gg4pO#
cFZbC*
rgQ1(bN
"a<'sg
C{Z86}
.}%B.o#
%e4U]4
l^sQ+>"c
%>cn:C"o
=H:-P&zmQ=xj
FA5SDGGv6:2m_3jh*op
V{Br>a|)b+)T7`
!EA0My!
j<y"l/8
Qwr*j3
4D<>%-
cCS!pD
c+0&PM
An~99A6*
#pD3np>
<.}CsR
$Gn|:e7
$0@Z}d
M4>wK2d
(($2*i
!YtOh*
Jm"_U^r
qB+7b>
A?lQF+#"
9F4o;Q
Yg2<nl
b>zfsRi*x
U7t2=
|&}Tjv
Jdh/%Q
1hsGKpxX|4wn
c.^uD2DJ@m
J*b9[{8
I;5;(UeI`a
XXjiHGJ
j'&}I#Tu?r-1a
k`J[aY
Ku"e-`q<0po
c\0Iw
i'Q^(PZi
O"%TxIo
/{<WTR
yYK4q X,zo
bYD;5u@%:
dIB3^Nq
gGHB(X?D
,ubF@NbPT6dfWu
PnaRe?
]h_^d2
At\oSTgw2
E+Bto;
D\MDm@/
W?<.bm
gBAD^Xmc
3OODZ.su
zgAvDv
@aJp!R
G}51-Z@
h6PF,#\2l
)mVeE@
}'@R%R}kH
j_PJPd7<X?
CK0vhewd~
"nakf
DE7Y\S
D*h+nP
uR6QG @=
4V b+u
;~Tqv%
/G.51'1p
TWYi,6&rV2
rY|J%gm
U(*&%)~c,
uu`&KbV{T
i8QRC+
[gR#\A=
5H_\qjopQD$_C
5}(7l
ap!Kt/
{"rJnL;h
@Q*{/lR
`(CiQW
:UoJnfUQ}4
*xAoZ&S
@U!I-RB
v>'=cwFsu;h?
o|JN3AaiA@P
p{N:*4.'2
Wv_Lc^u
!=>T3!sE!e
P{p~>3!)
@!$RQ@
c:( kD
HA~:tWJ~
zXm_6GJxrAhD/S
$1P9uFFShKb
UWVS|$
t$dD$\
T$L1;\$L
t$t#t$lD$`T$x
D$t#D$hl$x
D$t+D$\$
D$@d$@L$@
9s#D$H
t".)D$H)
T$8L$PL$xf
D$\l$TD$X1|$`
D$`L$D
9s`)L$4|$4
t$4D$H|$t
D$`D$t+D$\D
*BT$t1
l$8f))
D$T&))
T$TD$PT$PL$XL$Tl$\D$\l$X1|$`
9s/D$H
9s;D$H
t$(Nt$(uL$0
T$,|$`
l$$Ml$$uP
)D$H)
$L$ d$
p4$Ft$\tYL$
9l$\w_$
BD$tIt
GPGWHUD
XPTPSWXaD$j
Ineter Mc*1*|OFF|*appdata**trys.exe*
KERNEL32.DLL
MSVBVM60.DLL
LoadLibraryA
GetProcAddress
VirtualProtect
VirtualAlloc
VirtualFree
ExitProcess
rPw41j6G
RwTVp41j
URQSVW3dp0v
_^[YZ]URQSVWl$
tCE<T(x
;|$ uZ$
_^[YZ]
pdyinkgugfv5
V S _ V E R S I O N _ I N F O
V a r F i l e I n f o
T r a n s l a t i o n
S t r i n g F i l e I n f o
0 4 0 9 0 4 B 0
P r o d u c t N a m e
C R I T I C
F i l e V e r s i o n
P r o d u c t V e r s i o n
I n t e r n a l N a m e
O r i g i n a l F i l e n a m e
k e r n e l 3 2
3 9 7 C F 9
F 4 0 C F 9 6 A
F 2 E 9 7 A
4 3 4 3 4 E 5
2 3 4 1 2 1 C A 3 1 5
1 0 7 0 0 6 C 4
TCP
No TCP connections recorded.
UDP
Source |
Source Port |
Destination |
Destination Port |
192.168.56.101 |
53179 |
224.0.0.252 |
5355 |
192.168.56.101 |
49642 |
224.0.0.252 |
5355 |
192.168.56.101 |
137 |
192.168.56.255 |
137 |
192.168.56.101 |
61714 |
114.114.114.114 |
53 |
192.168.56.101 |
56933 |
114.114.114.114 |
53 |
192.168.56.101 |
138 |
192.168.56.255 |
138 |
HTTP & HTTPS Requests
No HTTP requests performed.
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts
Sorry! No dropped buffers.