0.9
低危

1cdbe1e71f4212a598c3530c783082522a02be65c1b46f0a40f8ec2f716c681a

1cdbe1e71f4212a598c3530c783082522a02be65c1b46f0a40f8ec2f716c681a.exe

分析耗时

194s

最近分析

362天前

文件大小

17.5KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN OBERAL
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.48
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Malware:Win32/km_2497a5.None 20190527 0.3.0.5
Avast Win32:Small-MHA [Trj] 20240330 23.9.8494.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (W) 20231026 1.0
Kingsoft malware.kb.a.1000 20230906 None
McAfee QLowZones-43 20240330 6.0.6.653
Tencent Trojan.Win32.Small.wa 20240330 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (2 个事件)
host 114.114.114.114
host 8.8.8.8
文件已被 VirusTotal 上 64 个反病毒引擎识别为恶意 (50 out of 64 个事件)
ALYac Trojan.GenericKDZ.70400
APEX Malicious
AVG Win32:Small-MHA [Trj]
Acronis suspicious
AhnLab-V3 Trojan/Win32.Agent.C57026
Alibaba Malware:Win32/km_2497a5.None
Antiy-AVL Trojan/Win32.Oberal.a
Arcabit Trojan.Generic.D11300
Avast Win32:Small-MHA [Trj]
Avira TR/ATRAPS.Gen
BitDefender Trojan.GenericKDZ.70400
BitDefenderTheta AI:Packer.49BDF6B71F
Bkav W32.AIDetectMalware
CAT-QuickHeal Trojan.Mauvaise.SL1
ClamAV Win.Malware.Fugrafa-9806497-0
CrowdStrike win/malicious_confidence_100% (W)
Cybereason malicious.15697b
Cylance unsafe
Cynet Malicious (score: 100)
DeepInstinct MALICIOUS
DrWeb Trojan.LowZones.1019
ESET-NOD32 a variant of Win32/Oberal.A
Elastic malicious (high confidence)
Emsisoft Trojan.GenericKDZ.70400 (B)
F-Secure Trojan.TR/ATRAPS.Gen
FireEye Generic.mg.a1a359e15697beff
Fortinet W32/Oberal.A!tr
GData Win32.Trojan.PSE.118T4T3
Google Detected
Ikarus Trojan.Small
Jiangmin Trojan/Small.enf
K7AntiVirus Trojan ( 005450941 )
K7GW Trojan ( 005450941 )
Kaspersky Trojan.Win32.Small.xxd
Kingsoft malware.kb.a.1000
Lionic Trojan.Win32.Small.4!c
MAX malware (ai score=82)
Malwarebytes Oberal.Trojan.Dropper.DDS
MaxSecure Trojan.Small.xxd
McAfee QLowZones-43
MicroWorld-eScan Trojan.GenericKDZ.70400
Microsoft TrojanSpy:Win32/Small.M
NANO-Antivirus Trojan.Win32.Small.cnwqmt
Panda Trj/Downloader.XIA
Rising Trojan.Oberal!1.BDEF (CLASSIC)
SUPERAntiSpyware Trojan.Agent/Gen-Small
Sangfor Trojan.Win32.Save.a
SentinelOne Static AI - Malicious PE
Skyhigh BehavesLike.Win32.QLowZones.lt
Sophos Troj/Small-EMT
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2008-09-03 23:38:59

PE Imphash

1e4c0da5737da53aff5e6e0ab7de1efa

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00000fbe 0x00001000 5.540635425032476
.rdata 0x00002000 0x000002b4 0x00000400 3.5466853127583944
.data 0x00003000 0x00003f9f 0x00002800 4.484008079409206
.rsrc 0x00007000 0x00000470 0x00000600 2.05011805735382

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000070f0 0x000002e8 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_MENU 0x000073f0 0x00000080 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x000073d8 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library kernel32.dll:
0x402014 GetLastError
0x402018 GetModuleFileNameA
0x40201c GetSystemDirectoryA
0x402024 ExitProcess
0x402028 OpenMutexA
0x40202c Process32First
0x402030 Process32Next
0x402034 Sleep
0x40203c CreateMutexA
0x402040 CopyFileA
0x402044 OpenFile
0x402048 CloseHandle
0x40204c FindClose
0x402050 FindFirstFileA
Library advapi32.dll:
0x402000 RegOpenKeyExA
0x402004 RegCreateKeyA
0x402008 RegCloseKey
0x40200c RegSetValueExA
Library shell32.dll:
0x40205c ShellExecuteA

L!This program cannot be run in DOS mode.
9emjemjemj/z~jemj]E
jemjfckjemjRichemj
`.rdata
@.data
b(U.=,U@
bi1?gh
bQThd@
boI|--Hhd@
F2EPVEu
USVWUu
CloseHandle
CopyFileA
CreateMutexA
CreateToolhelp32Snapshot
ExitProcess
GetLastError
GetModuleFileNameA
GetSystemDirectoryA
GetWindowsDirectoryA
OpenFile
OpenMutexA
Process32First
Process32Next
kernel32.dll
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
advapi32.dll
SHGetSpecialFolderPathA
ShellExecuteA
shell32.dll
FindClose
FindFirstFileA
1A2466363E2F723629700A05054F490C187C26000D520B164F215432321D4E090A16017C3010151500271F76071B1D491C1B7C2C07184952070E544B3A0B54100C4E20536E651B4E08163D427C7324353420
1A2466363E2F7236296D0C0A1E4353060D54373E074E000A57347C2D100652080B15244501160E080B1539550C356E2047332065686C2C20686B206B5B6E206454617514585347165E20533417415651555C
1A2466363E2F7236296D0C0A1E4353060D54373E074E000A57340020312863181713174E073302151620044E3E20034114100023000049002C1345081C1A490B0B0008501A0C1B4E1E3961721036555F5727
1A2466363E2F7236296D0C0A1E4353060D54373E074E000A57347C2D100652080B15244501160E080B15224E160C1C4E160100360C185849070C533733014E01167C737C6E651B4E1E3961721036555F5727
1A2466363E2F7236296D0C0A1E4353060D54373E074E000A57347C2D100652080B15244501160E080B15224E160C1C4E160100360C185849070C533733014E01167C747C6E651B4E1E3961721036555F5727
1A2466363E2F7236296D0C0A1E4353060D54373E074E000A57347C2D100652080B15244501160E080B15224E160C1C4E160100360C185849070C533733014E01167C777C6E651B4E1E3961721036555F5727
1A2466363E2F7236296D0C0A1E4353060D54373E074E000A57347C2D100652080B15244501160E080B15224E160C1C4E160100360C185849070C53372501430F014F304E313F1B4E08163D427C73555F5727
1A2466363E2F7236296D0C0A1E4353060D54373E074E000A57347C2D100652080B15244501160E080B15224E160C1C4E160100360C185849070C536B696E2064652047206E6574206D656172207365676765
13044E071A3D451000520C1D1579500E19410F0C2A4F0A002047206EF56D826D85BA332073656767F9
1A2466363E2F7236296D0C0A1E4353060D543720005401174E22544E200C50010A1317522F28060E0B152D45031D1B5216364F0B1D1E434C356B536B696E2064652047206E6574206D656172207365676765
0F2E61363C3C652C396F26282061612A2369252C316C2B266B036F392B28206D656172207365676765
200E5812050152165B451D0C6C2C67696B206B690E86C565A09A616E6574206D296530207BFFFA6705
1A2466363E2F7236296D0C0A1E4353060D543720005401174E22544E200C50010A1317522F360204103B02541B356E2032452065686C2C20686B206B5B6E206454617514585347165E20533417415651555C
1A2466363E2F7236296D0C0A1E4353060D543720005401174E22544E200C50010A1317522F2B0210451E024E060619532F752065686C2C20686B206B5B6E206454617514585347165E20533417415651555C
1A2466363E2F7236296D0C0A1E4353060D54373E074E000A57347C2D100652080B15244501160E080B15224E160C1C4E160100360C185849070C5337696E206465204720EE40E9208D1EFA72800EFE67071A
0D0253030B0245201043101B0558593A0E541F0000471726482243056574206D656172207365676765
0D0253030B02453A185017061A494433044E0E2A0645070E2047206EF56D826D85BA332073656767F9
1A0E43171B07540A2A682E2521734F0707596B690E86C565A09A616E6574206D296530207BFFFA6705
3D0A53090409525D1058006935EB80698B5BF0690E5FFF65803ABB6E015474081D1548209AA2C76715
3B0E47070D07545D10580069E5EB80698B5BF069CE5DFF65E052BA6EC5F5BE6D65617220D2A2C76765
3A1B4F0D051D565D1058006935EB80698B5BF0690E5FFF65803ABB6E015474081D1548209AA2C76715
200E5812050152165B451D0C6C2C4F0707596B690E86C565A09A616E6574206D296530207BFFFA6705
2F0252070F01585D105800696CEC80696B3E2A69AEE8C4652347206E6174206D6561722073A5C76785
0D0E42170E09450175205F696CEC80696B3E2A69AEE8C4652347206E6174206D6561722073A5C76785
0F0741051A6E20730D545F696CEC80696B3E2A69AEE8C4652347206E6174206D6561722073A5C76785
190450171923470175205F696CEC80696B3E2A69AEE8C4652347206E6174206D6561722073A5C76785
1527733124216E5D3078206915E480691B51F7696EE5C4655885806E65B1806D6561722073A5C76764
050A59071B1D451000520C1D150C730C1956020A0B4D0B0B49334F1C6574206D656172207365676765
0538732F26200E362D6545494C0C00494B004B494E0044450067004E4554004D454152005345474745496B20525ACF2072752065406C2C202000000900000017100022490249544906450A1B4E5301024722
150F4914115D125D114C0969CDEB8069EB30F1694E33FE65E052BA6EC5F5BE6D65617220CAA2C76765
152773233A3D6D34270E2031292C4F0707596B690E86C565A09A616E6574206D296530207BFFFA6705
1518500D060253055B451D0C6C2C4F0707596B690E86C565A09A616E6574206D296530207BFFFA6705
15224E160C1C4E16010020111C404F1B0E5237000B5814094F354540000C456D656172207365676765
15264F1800024C1255660C1B094A4F113746021B0B460B1D0E22580B6574456D656172207365676765
1518500D06020E160D45656985EB80691B51F7690E5FFF65803ABB6E015474081D15482073A5C76715
15224E160C1C4E16010020111C404F1B0E5237000B5814094F350E0B1D11206D656172207365676765
15264F1800024C1255660C1B094A4F113746021B0B460B1D456945160074206D656172207365676765
1A2466363E2F7236296D0C0A1E4353060D54373E074E000A57347C2D100652080B15244501160E080B15224E160C1C4E160100360C185849070C53372501430F014F304E313F1B4E08163D427C7324353420
795E135A5F2A15414019502F5E1C175A5B645E5D5B66525C1872652C5D441654542347113552515E5545354647463635383033416B423645795A15565E5A104B4464545C581412595C132A5C2D1752521172
05386D52595F20730D545F6985EB80691B51F7690E5FFF65803ABB6E015474081D15482073A5C76715
05387337392A20730D545F6985EB80691B51F7690E5FFF65803ABB6E015474081D15482073A5C76715
05386D52595F20730D545F6985EB80691B51F7690E5FFF65803ABB6E015474081D15482073A5C76715
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
0@P`p
wwwwwwwwwwwww
wwwwwwwwwwwww
wwwwwwwwwwwww
wwwwwwwwwwwww
&About

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 61714 8.8.8.8 53
192.168.56.101 56933 8.8.8.8 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53
192.168.56.101 58485 8.8.8.8 53
192.168.56.101 57665 114.114.114.114 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.