5.2
中危

df86a3bc11ef31e4a28859a555554e3da17f1df3647e4e9df83ba356b8707d36

aae8985c800c2b89defe4b8a764fbfb2.exe

分析耗时

78s

最近分析

文件大小

170.7KB
静态报毒 动态报毒 100% AI SCORE=74 APPL BSCOPE CMRTAZOJ8DNQK5SMCLKNTSRJPFHL CONFIDENCE ELDORADO ET#86% FDUKAZ GRAYWARE HIGH CONFIDENCE LOADMONEY M@7OHO6U MACHAER MAIL MAILRU R232581 RDMK RU DOWNLOADER SCORE SUSPICIOUS PE TOOL UNSAFE 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee PUP-HAI 20200806 6.0.6.653
Alibaba 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Adware-DMM [PUP] 20200806 18.4.3895.0
Tencent 20200806 1.0.0.1
Kingsoft 20200806 2013.8.14.323
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
静态指标
This executable is signed
This executable has a PDB path (1 个事件)
pdb_path D:\Build\desktop_apps\_out\launcher.pdb
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1620985509.441915
GlobalMemoryStatusEx
success 1 0
行为判定
网络通信
Communicates with host for which no DNS query was performed (3 个事件)
host 151.139.128.14
host 172.217.24.14
host 52.218.26.20
Generates some ICMP traffic
File has been identified by 47 AntiVirus engines on VirusTotal as malicious (47 个事件)
MicroWorld-eScan Gen:Variant.Application.Agent.6
FireEye Generic.mg.aae8985c800c2b89
CAT-QuickHeal Trojan.Loadmoney
McAfee PUP-HAI
Zillya Tool.Agent.Win32.26977
K7AntiVirus Adware ( 0054652b1 )
K7GW Adware ( 0054652b1 )
Cybereason malicious.c800c2
Arcabit Trojan.Application.Agent.6
Invincea heuristic
F-Prot W32/S-2773094c!Eldorado
Symantec SMG.Heur!gen
APEX Malicious
ClamAV Win.Malware.Mailru-6804164-0
Kaspersky not-a-virus:HEUR:AdWare.Win32.Machaer.gen
BitDefender Gen:Variant.Application.Agent.6
NANO-Antivirus Riskware.Win32.MailRu.fdukaz
Avast Win32:Adware-DMM [PUP]
Ad-Aware Gen:Variant.Application.Agent.6
Sophos Mail.ru Downloader (PUA)
Comodo Application.Win32.MailRu.M@7oho6u
F-Secure Program.APPL/MailRu.B
DrWeb Adware.Downware.19192
VIPRE Trojan.Win32.Generic!BT
Emsisoft Application.Downloader (A)
SentinelOne DFI - Suspicious PE
Cyren W32/S-2773094c!Eldorado
Jiangmin AdWare.Machaer.ad
Avira APPL/MailRu.B
Antiy-AVL GrayWare[Adware]/Win32.Mailru.m
Microsoft PUA:Win32/LoadMoney
Endgame malicious (high confidence)
ZoneAlarm not-a-virus:HEUR:AdWare.Win32.Machaer.gen
GData Gen:Variant.Application.Agent.6
Cynet Malicious (score: 100)
AhnLab-V3 PUP/Win32.MailRu.R232581
MAX malware (ai score=74)
VBA32 BScope.Adware.Machaer
Malwarebytes RiskWare.Agent
ESET-NOD32 a variant of Win32/MailRu.M potentially unwanted
Rising Malware.Heuristic!ET#86% (RDMK:cmRtazoJ8DNqK5SMcLKNtSRJPFHl)
Yandex Riskware.Agent!
Ikarus PUA.MailRu
eGambit Unsafe.AI_Score_99%
Fortinet W32/MailRu.M!tr
AVG Win32:Adware-DMM [PUP]
CrowdStrike win/malicious_confidence_100% (D)
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2018-04-02 22:25:18

Imports

Library KERNEL32.dll:
0x41c020 WriteFile
0x41c024 ReadFile
0x41c028 CreateDirectoryW
0x41c02c CreateFileW
0x41c030 GetLastError
0x41c034 GetTickCount
0x41c038 GetTempPathW
0x41c03c GetTempFileNameW
0x41c040 RemoveDirectoryW
0x41c044 DeleteFileW
0x41c048 GetModuleFileNameW
0x41c04c GetFileSize
0x41c050 LockFileEx
0x41c054 UnlockFile
0x41c058 GetVersionExW
0x41c05c MultiByteToWideChar
0x41c060 WideCharToMultiByte
0x41c064 LocalFree
0x41c068 SetEvent
0x41c06c Sleep
0x41c070 CreateEventW
0x41c074 HeapAlloc
0x41c078 HeapReAlloc
0x41c07c HeapFree
0x41c080 HeapSize
0x41c084 GetProcessHeap
0x41c088 DecodePointer
0x41c08c RaiseException
0x41c098 GetACP
0x41c09c GetModuleHandleW
0x41c0ac GetStringTypeW
0x41c0b0 EncodePointer
0x41c0b4 RtlUnwind
0x41c0b8 GetStdHandle
0x41c0bc GetFileType
0x41c0c0 GetModuleHandleExW
0x41c0c4 WriteConsoleW
0x41c0c8 GetCommandLineW
0x41c0cc GetConsoleCP
0x41c0d0 GetConsoleMode
0x41c0d4 GetCPInfo
0x41c0d8 CreateProcessW
0x41c0e0 SetLastError
0x41c0e4 GetCurrentProcess
0x41c0e8 TerminateProcess
0x41c0ec TlsAlloc
0x41c0f0 TlsGetValue
0x41c0f4 TlsSetValue
0x41c0f8 TlsFree
0x41c0fc GetStartupInfoW
0x41c104 LCMapStringW
0x41c108 ExitProcess
0x41c10c IsDebuggerPresent
0x41c110 GetCurrentThreadId
0x41c114 OutputDebugStringW
0x41c118 LoadLibraryExW
0x41c120 GetCurrentProcessId
0x41c130 FlushFileBuffers
0x41c134 SetFilePointerEx
0x41c138 IsValidCodePage
0x41c13c GetOEMCP
0x41c140 SetStdHandle
0x41c144 FreeLibrary
0x41c148 FormatMessageA
0x41c14c GetModuleHandleA
0x41c150 LoadLibraryW
0x41c154 CloseHandle
0x41c158 WaitForSingleObject
0x41c160 GetProcAddress
0x41c164 LoadLibraryExA
Library SHELL32.dll:
0x41c16c SHGetFolderPathW
Library WS2_32.dll:
0x41c174 ntohl
Library ADVAPI32.dll:
0x41c000 CryptDestroyKey
0x41c008 CryptCreateHash
0x41c00c CryptHashData
0x41c010 CryptReleaseContext
0x41c014 CryptDestroyHash
Library ole32.dll:
0x41c17c CoTaskMemFree
0x41c180 StringFromCLSID
0x41c184 CoCreateGuid

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49174 94.100.180.110 gosoftdl.mail.ru 443
52.218.26.20 80 192.168.56.101 49187

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 60123 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56540 239.255.255.250 3702
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58370 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 58367 8.8.8.8 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.