5.2
中危

15beff92975854f5a95b66ba38649db72b2145cc283d0c7991317cbaf8aecced

b0a56f5a81f0f26b4628a1f79c35aacd.exe

分析耗时

80s

最近分析

文件大小

170.7KB
静态报毒 动态报毒 100% AI SCORE=71 APPL BSCOPE CONFIDENCE ELDORADO FDUKAZ GRAYWARE HIGH CONFIDENCE LOADMONEY M@7OHO6U MACHAER MAIL MAILRU R232581 RU DOWNLOADER SCORE SUSPICIOUS PE TOOL UNSAFE 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee PUP-HAI 20200902 6.0.6.653
Alibaba 20190527 0.3.0.5
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Baidu 20190318 1.0.0.2
Tencent 20200902 1.0.0.1
Kingsoft 20200902 2013.8.14.323
静态指标
This executable is signed
This executable has a PDB path (1 个事件)
pdb_path D:\Build\desktop_apps\_out\launcher.pdb
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 个事件)
Time & API Arguments Status Return Repeated
1621004092.908373
GlobalMemoryStatusEx
success 1 0
行为判定
动态指标
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Encryption keys have been identified in this analysis
Performs some HTTP requests (1 个事件)
request GET https://gosoftdl.mail.ru/switcher_pd_3_9.exe?masterid=%7BAFBFF356-F51B-4FF7-BBBA-7CF8042E3287%7D&osver=6.1
Creates executable files on the filesystem (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\ln8490968\lrunner.exe
Drops an executable to the user AppData folder (1 个事件)
file C:\Users\Administrator.Oskar-PC\AppData\Local\Temp\ln8490968\lrunner.exe
网络通信
Communicates with host for which no DNS query was performed (3 个事件)
host 172.217.24.14
host 203.208.41.33
host 203.208.41.66
Generates some ICMP traffic
File has been identified by 43 AntiVirus engines on VirusTotal as malicious (43 个事件)
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
FireEye Generic.mg.b0a56f5a81f0f26b
CAT-QuickHeal Trojan.Loadmoney
McAfee PUP-HAI
VIPRE Trojan.Win32.Generic!BT
K7AntiVirus Riskware ( 0040eff71 )
K7GW Riskware ( 0040eff71 )
CrowdStrike win/malicious_confidence_100% (D)
Arcabit Trojan.Application.Agent.6
Cyren W32/S-2773094c!Eldorado
Symantec SMG.Heur!gen
APEX Malicious
ClamAV Win.Malware.Mailru-6804164-0
Kaspersky not-a-virus:HEUR:AdWare.Win32.Machaer.gen
BitDefender Gen:Variant.Application.Agent.6
NANO-Antivirus Riskware.Win32.MailRu.fdukaz
MicroWorld-eScan Gen:Variant.Application.Agent.6
Ad-Aware Gen:Variant.Application.Agent.6
Comodo Application.Win32.MailRu.M@7oho6u
F-Secure Program.APPL/MailRu.B
DrWeb Adware.Downware.19192
Zillya Tool.Agent.Win32.26977
Invincea heuristic
Sophos Mail.ru Downloader (PUA)
Ikarus PUA.MailRu
Jiangmin AdWare.Machaer.ad
Avira APPL/MailRu.B
Antiy-AVL GrayWare[Adware]/Win32.Mailru.m
Microsoft PUA:Win32/LoadMoney
ZoneAlarm not-a-virus:HEUR:AdWare.Win32.Machaer.gen
GData Gen:Variant.Application.Agent.6
AhnLab-V3 PUP/Win32.MailRu.R232581
MAX malware (ai score=71)
VBA32 BScope.Adware.Machaer
Malwarebytes RiskWare.Agent
ESET-NOD32 a variant of Win32/MailRu.M potentially unwanted
SentinelOne DFI - Suspicious PE
eGambit Unsafe.AI_Score_99%
Fortinet W32/MailRu.M!tr
MaxSecure Adware.Adware.Machaer.gen_172020
AVG Win32:Adware-DMN [PUP]
Cybereason malicious.a81f0f
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2018-04-02 22:25:18

Imports

Library KERNEL32.dll:
0x41c020 WriteFile
0x41c024 ReadFile
0x41c028 CreateDirectoryW
0x41c02c CreateFileW
0x41c030 GetLastError
0x41c034 GetTickCount
0x41c038 GetTempPathW
0x41c03c GetTempFileNameW
0x41c040 RemoveDirectoryW
0x41c044 DeleteFileW
0x41c048 GetModuleFileNameW
0x41c04c GetFileSize
0x41c050 LockFileEx
0x41c054 UnlockFile
0x41c058 GetVersionExW
0x41c05c MultiByteToWideChar
0x41c060 WideCharToMultiByte
0x41c064 LocalFree
0x41c068 SetEvent
0x41c06c Sleep
0x41c070 CreateEventW
0x41c074 HeapAlloc
0x41c078 HeapReAlloc
0x41c07c HeapFree
0x41c080 HeapSize
0x41c084 GetProcessHeap
0x41c088 DecodePointer
0x41c08c RaiseException
0x41c098 GetACP
0x41c09c GetModuleHandleW
0x41c0ac GetStringTypeW
0x41c0b0 EncodePointer
0x41c0b4 RtlUnwind
0x41c0b8 GetStdHandle
0x41c0bc GetFileType
0x41c0c0 GetModuleHandleExW
0x41c0c4 WriteConsoleW
0x41c0c8 GetCommandLineW
0x41c0cc GetConsoleCP
0x41c0d0 GetConsoleMode
0x41c0d4 GetCPInfo
0x41c0d8 CreateProcessW
0x41c0e0 SetLastError
0x41c0e4 GetCurrentProcess
0x41c0e8 TerminateProcess
0x41c0ec TlsAlloc
0x41c0f0 TlsGetValue
0x41c0f4 TlsSetValue
0x41c0f8 TlsFree
0x41c0fc GetStartupInfoW
0x41c104 LCMapStringW
0x41c108 ExitProcess
0x41c10c IsDebuggerPresent
0x41c110 GetCurrentThreadId
0x41c114 OutputDebugStringW
0x41c118 LoadLibraryExW
0x41c120 GetCurrentProcessId
0x41c130 FlushFileBuffers
0x41c134 SetFilePointerEx
0x41c138 IsValidCodePage
0x41c13c GetOEMCP
0x41c140 SetStdHandle
0x41c144 FreeLibrary
0x41c148 FormatMessageA
0x41c14c GetModuleHandleA
0x41c150 LoadLibraryW
0x41c154 CloseHandle
0x41c158 WaitForSingleObject
0x41c160 GetProcAddress
0x41c164 LoadLibraryExA
Library SHELL32.dll:
0x41c16c SHGetFolderPathW
Library WS2_32.dll:
0x41c174 ntohl
Library ADVAPI32.dll:
0x41c000 CryptDestroyKey
0x41c008 CryptCreateHash
0x41c00c CryptHashData
0x41c010 CryptReleaseContext
0x41c014 CryptDestroyHash
Library ole32.dll:
0x41c17c CoTaskMemFree
0x41c180 StringFromCLSID
0x41c184 CoCreateGuid

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49175 5.181.61.0 gosoftdl.mail.ru 443

UDP

Source Source Port Destination Destination Port
192.168.56.101 50002 114.114.114.114 53
192.168.56.101 50568 114.114.114.114 53
192.168.56.101 53237 114.114.114.114 53
192.168.56.101 57756 114.114.114.114 53
192.168.56.101 57874 114.114.114.114 53
192.168.56.101 62318 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 51378 224.0.0.252 5355
192.168.56.101 51808 224.0.0.252 5355
192.168.56.101 51963 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60384 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 63429 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 50539 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.