0.6
低危

0bee7ab0f53665e749fb85c6b2bb8cca62a8b463071cfa0f6648e312b2d161de

0bee7ab0f53665e749fb85c6b2bb8cca62a8b463071cfa0f6648e312b2d161de.exe

分析耗时

17s

最近分析

378天前

文件大小

28.5KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN RAZY
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.57
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
Kingsoft None 20200204 2013.8.14.323
McAfee GenericRXIJ-BB!A52AA8C5E52E 20200204 6.0.6.653
Tencent None 20200204 1.0.0.1
静态指标
行为判定
动态指标
网络通信
文件已被 VirusTotal 上 49 个反病毒引擎识别为恶意 (49 个事件)
ALYac Gen:Variant.Razy.396392
APEX Malicious
AVG Win32:CrypterX-gen [Trj]
Acronis suspicious
Ad-Aware Gen:Variant.Razy.396392
AhnLab-V3 Win-Trojan/LimeRAT.Exp
Arcabit Trojan.Razy.D60C68
Avira TR/Spy.Gen8
BitDefender Gen:Variant.Razy.396392
BitDefenderTheta Gen:NN.ZemsilF.34084.biW@aaig6jp
CAT-QuickHeal Trojan.MsilFC.S9414873
ClamAV Win.Malware.Barys-6836745-0
CrowdStrike win/malicious_confidence_100% (W)
Cybereason malicious.5e52e4
Cylance Unsafe
Cyren W32/Tasker.A.gen!Eldorado
DrWeb Trojan.DownLoader29.2373
ESET-NOD32 a variant of MSIL/Agent.BPK
Emsisoft Gen:Variant.Razy.396392 (B)
Endgame malicious (high confidence)
F-Prot W32/Tasker.A.gen!Eldorado
F-Secure Trojan.TR/Spy.Gen8
FireEye Generic.mg.a52aa8c5e52e4c8f
Fortinet MSIL/Agent.SWO!tr
GData MSIL.Trojan-Ransom.LimeRans.A
Ikarus Trojan.MSIL.Agent
Invincea heuristic
K7AntiVirus Trojan ( 700000121 )
Kaspersky HEUR:Trojan.MSIL.Tasker.gen
MAX malware (ai score=87)
Malwarebytes Backdoor.LimeRat
MaxSecure Trojan.Malware.300983.susgen
McAfee GenericRXIJ-BB!A52AA8C5E52E
McAfee-GW-Edition BehavesLike.Win32.Trojan.mm
MicroWorld-eScan Gen:Variant.Razy.396392
Microsoft Backdoor:Win32/LimeRat.YA!MTB
Panda Trj/GdSda.A
Qihoo-360 HEUR/QVM03.0.0439.Malware.Gen
Rising Backdoor.LimeRat!1.B863 (CLASSIC)
Sangfor Malware
SentinelOne DFI - Malicious PE
Symantec ML.Attribute.HighConfidence
Trapmine malicious.high.ml.score
TrendMicro Coinminer.MSIL.LIMERAT.SMA
TrendMicro-HouseCall Coinminer.MSIL.LIMERAT.SMA
VIPRE Trojan.Win32.Generic!BT
Zillya Trojan.Injector.Win32.500896
ZoneAlarm HEUR:Trojan.MSIL.Tasker.gen
eGambit Unsafe.AI_Score_99%
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-01-11 23:38:34

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00006d54 0x00006e00 6.069229901656176
.reloc 0x0000a000 0x0000000c 0x00000200 0.08153941234324169

Imports

Library mscoree.dll:
0x402000 _CorExeMain

L!This program cannot be run in DOS mode.
`.reloc
i?>%()
v4.0.30319
#Strings
_Closure$__R1-0
$IR12-1
_Lambda$__R12-1
ThreadSafeObjectProvider`1
List`1
$IR13-2
_Lambda$__R13-2
kernel32
Microsoft.Win32
ToInt32
_Lambda$__R2
$VB$NonLocal_2
get_UTF8
<Module>
ES_SYSTEM_REQUIRED
ES_DISPLAY_REQUIRED
EXECUTION_STATE
System.IO
ES_CONTINUOUS
_Closure$__
Dispose__Instance__
Create__Instance__
value__
ProjectData
mscorlib
System.Collections.Generic
Microsoft.VisualBasic
Thread
RijndaelManaged
get_IsAttached
get_Connected
Append
CompareMethod
get_Clipboard
Replace
CreateInstance
get_GetInstance
instance
GetHashCode
set_Mode
FileMode
EnterDebugMode
CompressionMode
CipherMode
SelectMode
FromImage
DrawImage
get_Message
Invoke
GetEnvironmentVariable
get_Available
IDisposable
RuntimeTypeHandle
GetTypeFromHandle
WaitHandle
Rectangle
DownloadFile
DeleteFile
IsInRole
WindowsBuiltInRole
AppWinStyle
get_Name
GetTempFileName
GetFileName
get_MachineName
get_OSFullName
get_UserName
GetProcessesByName
DateTime
get_LastWriteTime
GetType
MethodBase
ConsoleApplicationBase
Dispose
EditorBrowsableState
SetThreadExecutionState
SetApartmentState
Delete
ThreadStaticAttribute
STAThreadAttribute
CompilerGeneratedAttribute
HelpKeywordAttribute
GeneratedCodeAttribute
EditorBrowsableAttribute
ComVisibleAttribute
StandardModuleAttribute
HideModuleNameAttribute
DebuggerHiddenAttribute
MyGroupCollectionAttribute
m_ThreadStaticValue
DeleteValue
GetObjectValue
GetValue
SetValue
Receive
set_SendBufferSize
set_ReceiveBufferSize
get_Jpeg
System.Threading
add_SessionEnding
NewLateBinding
Encoding
System.Drawing.Imaging
IsLogging
FromBase64String
ToBase64String
CompareString
ToString
GetString
Substring
System.Drawing
ComputeHash
get_ExecutablePath
get_Width
get_Length
StartsWith
TimerCallback
TransformFinalBlock
RtlSetProcessIsCritical
NetworkCredential
System.Security.Principal
WindowsPrincipal
ConditionalCompareObjectNotEqual
System.ComponentModel
LateCall
kernel32.dll
NTdll.dll
coredll.dll
FileStream
GZipStream
MemoryStream
get_Item
System
SymmetricAlgorithm
HashAlgorithm
Random
ICryptoTransform
ToBoolean
CopyFromScreen
get_PrimaryScreen
System.ComponentModel.Design
AppDomain
get_CurrentDomain
System.IO.Compression
MyApplication
CopyPixelOperation
Interaction
System.Reflection
ManagementObjectCollection
set_Position
Exception
Environ
get_Reason
get_Info
MethodInfo
FileInfo
FileSystemInfo
MemberInfo
ComputerInfo
DirectoryInfo
Bitmap
EndApp
MD5CryptoServiceProvider
StringBuilder
ToInteger
Debugger
ManagementObjectSearcher
SessionEndingEventHandler
System.CodeDom.Compiler
ToUpper
CurrentUser
BitConverter
ServerComputer
MyComputer
ToLower
ClearProjectError
SetProjectError
ManagementObjectEnumerator
GetEnumerator
Activator
.cctor
Monitor
CreateDecryptor
CreateEncryptor
Graphics
System.Diagnostics
get_Bounds
GetMethods
Microsoft.VisualBasic.Devices
MyWebServices
Microsoft.VisualBasic.ApplicationServices
System.Runtime.InteropServices
Microsoft.VisualBasic.CompilerServices
System.Runtime.CompilerServices
Microsoft.VisualBasic.MyServices
GetInstances
GetDirectories
GetTypes
GetBytes
SocketFlags
Strings
SessionEndingEventArgs
ICredentials
set_Credentials
Equals
System.Windows.Forms
Contains
Conversions
SessionEndReasons
RuntimeHelpers
Operators
ManagementClass
FileAccess
Process
System.Net.Sockets
SystemEvents
Exists
Concat
ImageFormat
PixelFormat
AddObject
ManagementBaseObject
ConcatenateObject
ManagementObject
MyProject
Connect
LateGet
LateIndexGet
System.Net
Socket
SystemIdleTimerReset
get_Height
GraphicsUnit
get_Default
ToUpperInvariant
get_Client
WebClient
TcpClient
System.Management
RuntimeEnvironment
Component
get_Current
GetCurrent
ParameterizedThreadStart
Convert
set_SendTimeout
set_ReceiveTimeout
MoveNext
System.Text
GetText
SetText
Client.My
ToArray
set_Key
CreateSubKey
RegistryKey
System.Security.Cryptography
Assembly
LoadLibrary
GetRuntimeDirectory
CreateDirectory
Registry
WindowsIdentity
ClipboardProxy
6FNZY`
MyTemplate
11.0.0.0
My.Computer
My.Application
My.User
My.WebServices
4System.Web.Services.Protocols.SoapHttpClientProtocol
Create__Instance__
Dispose__Instance__
_CorExeMain
mscoree.dll
SbieDll.dll
windir
\vboxhook.dll
Y21kLmV4ZSAvYyBwaW5nIDAgLW4gMiAmIGRlbCA=
Select * from Win32_ComputerSystem
Manufacturer
microsoft corporation
VIRTUAL
vmware
VirtualBox
Microsoft
Windows
Unkown
PROCESSOR_ARCHITECTURE
dd/MM/yyy
Win32_Processor
ProcessorId
Win32_BIOS
SerialNumber
Win32_BaseBoard
Win32_VideoController
Rans-Status
Not encrypted
Not ready
Disabled
\root\SecurityCenter2
SELECT * FROM AntivirusProduct
displayName
Regasm
select CommandLine from Win32_Process where Name='{0}'
Regasm.exe
CommandLine
--donate-level=
Minning...
Win32_Processor.deviceid="CPU0"
Core(TM)
Unknow
Software\
:Zone.Identifier
tqzYLUCfJ3kyVevTi77ZnRQQ2lcF5d/fA/DQVso52mfMnM51d99O5m5Mr23p+eYk
123456
Wservices.exe
!PSend
!PStart
Error!
Plugin Error!
length
DownloadString
v0.1.9.2
schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'
Software\Microsoft\Windows\CurrentVersion\Run\
Flood!
_USB Error!
_PIN Error!

Process Tree


0bee7ab0f53665e749fb85c6b2bb8cca62a8b463071cfa0f6648e312b2d161de.exe, PID: 2064, Parent PID: 628

default registry file network process services synchronisation iexplore office pdf

Hosts

No hosts contacted.

DNS

No domains contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.