2516b7df6cfde5ba7ff78ebf690f9d1f38ab36a21feed219d95548907c88967a
2516b7df6cfde5ba7ff78ebf690f9d1f38ab36a21feed219d95548907c88967a.exe
静态报毒
动态报毒
CVE
FAMILY
METATYPE
PLATFORM
TYPE
UNKNOWN
WIN32
TROJAN
BDMJ
DACN
0.12
FACILE
1.00
IMCLNet
0.59
MFGraph
0.00
| 引擎 |
描述 |
特征 |
威胁分数 |
可能家族 |
检测耗时 |
|
DACN
|
基于动态分析和胶囊网络的可视化恶意软件检测
|
API调用、DLL以及注册表的修改情况
|
0.12
|
Unknown
|
0.06s
|
|
FACILE
|
利用改进的层次胶囊网络对二进制恶意软件图像进行识别分类
|
二进制图像映射为的灰度图像
|
1.00
|
Unknown
|
0.04s
|
|
IMCLNet
|
轻量化深度卷积网络模型实现恶意软件家族检测
|
原始二进制映射而成的可视化图像
|
0.59
|
Unknown
|
0.18s
|
|
MFGraph
|
利用静态特征构建图网络以检测恶意软件
|
原始二进制PE文件的静态特征节点
|
0.00
|
Unknown
|
0.00s
|
| 查杀引擎 |
查杀结果 |
查杀时间 |
查杀版本 |
|
Alibaba
|
None
|
20190527
|
0.3.0.5
|
|
Avast
|
Win32:Injector-CVF [Trj]
|
20200601
|
18.4.3895.0
|
|
Baidu
|
None
|
20190318
|
1.0.0.2
|
|
CrowdStrike
|
win/malicious_confidence_100% (D)
|
20190702
|
1.0
|
|
Kingsoft
|
None
|
20200601
|
2013.8.14.323
|
|
McAfee
|
GenericRXDX-PA!C2CB075EE8C1
|
20200601
|
6.0.6.653
|
|
Tencent
|
Malware.Win32.Gencirc.10b0cf31
|
20200601
|
1.0.0.1
|
该二进制文件可能包含加密或压缩数据,表明使用了打包工具
(2 个事件)
| section |
{'name': '.rsrc', 'virtual_address': '0x00001000', 'virtual_size': '0x00008000', 'size_of_data': '0x00001a00', 'entropy': 7.336583469710803} |
entropy |
7.336583469710803 |
description |
发现高熵的节 |
| entropy |
0.7183250593567883 |
description |
此PE文件的整体熵值较高 |
与未执行 DNS 查询的主机进行通信
(2 个事件)
| host |
114.114.114.114 |
| host |
8.8.8.8 |
文件已被 VirusTotal 上 60 个反病毒引擎识别为恶意
(50 out of 60 个事件)
| APEX |
Malicious |
| AVG |
Win32:Injector-CVF [Trj] |
| Acronis |
suspicious |
| Ad-Aware |
GenPack:Trojan.Agent.BDMJ |
| AhnLab-V3 |
Trojan/Win32.Vflooder.R197446 |
| Antiy-AVL |
GrayWare/Win32.BlackMoon.b |
| Arcabit |
GenPack:Trojan.Agent.BDMJ |
| Avast |
Win32:Injector-CVF [Trj] |
| Avira |
TR/Crypt.XPACK.Gen |
| BitDefender |
GenPack:Trojan.Agent.BDMJ |
| BitDefenderTheta |
Gen:NN.ZexaF.34122.aiW@aS45nyf |
| Bkav |
W32.HfsAutoB. |
| CAT-QuickHeal |
Trojan.Vflooder.MUE.P8 |
| ClamAV |
Win.Trojan.Generic-6260355-0 |
| Comodo |
TrojWare.Win32.Flooder.Agent.NAS@74ax2y |
| CrowdStrike |
win/malicious_confidence_100% (D) |
| Cybereason |
malicious.ee8c13 |
| Cylance |
Unsafe |
| Cyren |
W32/S-22510d9f!Eldorado |
| DrWeb |
Trojan.Flood.22061 |
| ESET-NOD32 |
a variant of Win32/Flooder.Agent.NAS |
| Emsisoft |
GenPack:Trojan.Agent.BDMJ (B) |
| Endgame |
malicious (high confidence) |
| F-Prot |
W32/S-22510d9f!Eldorado |
| F-Secure |
Trojan.TR/Crypt.XPACK.Gen |
| FireEye |
Generic.mg.c2cb075ee8c13910 |
| Fortinet |
W32/Cerbu.207!tr |
| GData |
GenPack:Trojan.Agent.BDMJ |
| Ikarus |
Trojan.Win32.Tiggre |
| Invincea |
heuristic |
| Jiangmin |
Trojan.Generic.atvdd |
| K7AntiVirus |
Trojan ( 0052292a1 ) |
| K7GW |
DoS-Trojan ( 004bca3a1 ) |
| Kaspersky |
HEUR:Trojan.Win32.Generic |
| MAX |
malware (ai score=87) |
| MaxSecure |
Win.MxResIcn.Heur.Gen |
| McAfee |
GenericRXDX-PA!C2CB075EE8C1 |
| McAfee-GW-Edition |
BehavesLike.Win32.Generic.zh |
| MicroWorld-eScan |
GenPack:Trojan.Agent.BDMJ |
| Microsoft |
Trojan:Win32/Vflooder.E |
| NANO-Antivirus |
Trojan.Win32.Flooder.eqqqsr |
| Qihoo-360 |
HEUR/QVM19.1.9BC1.Malware.Gen |
| Rising |
Trojan.Patched!1.A9BE (RDMK:cmRtazpJQxBYjwF+K5VXEzVHM5qB) |
| SUPERAntiSpyware |
Trojan.Agent/Gen-Flooder |
| Sangfor |
Malware |
| SentinelOne |
DFI - Malicious PE |
| Sophos |
Troj/Agent-AVZX |
| Symantec |
ML.Attribute.HighConfidence |
| Tencent |
Malware.Win32.Gencirc.10b0cf31 |
| Trapmine |
malicious.high.ml.score |
288x288
224x224
192x192
160x160
128x128
96x96
64x64
32x32
👋 欢迎使用 ChatHawk
我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!
🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
PE Compile Time
2060-10-13 18:49:52
PE Imphash
87bed5a7cba00c7e1f4015f1bdae2183
Sections
| Name |
Virtual Address |
Virtual Size |
Size of Raw Data |
Entropy |
| .rsrc |
0x00001000 |
0x00008000 |
0x00001a00 |
7.336583469710803 |
| coderpub |
0x00009000 |
0x00000c00 |
0x00000a32 |
5.803637642098208 |
coderpub
02$3hJ0
!XZ,B#(
Pu#VPE!X
7cW#DX
$pl8@M
e: text/
4d1ee14
a3191ba1
afde5261
326dcd7e
81793afa
cb6aa7e4
6d0b467b
c6ebcd36
ransfe
r-Encodi
ng: bina0ryA
R1SRD-
ExitPr
ocessB
06VFG#
Module
ualFre
ptAcquirNekGW
'FWg%R
WinHttpR
eceiveRe2p6W-ESen
dRequ}
"7'\3PE
<FOGJ.
0n`gwv
Z2SlXX
P&[t]A
>qMQ47"
3sQP`d
sj@A
|ov[r/j
<Z6=4dU
UR%"n
?n/F+"WP
-Disposi
m-data
; name
="apikey
!$#!
?`PDz+-~uF#V
u%c]to
E2"^d
e,O#EP
De{oy3
xx_wM@DH
6EG`@H$b
HvnJDBd
n@ZkFD
P8@FQ9`01
XBHB8
-gntAQ
s_PE?`B%-D
]w1>-
p808,@
RNEL32.D
ADVAP@I0@
$VDUS ER(tDEB
<)740'
N1rb-u
0s/7D~
8Muex<
M,\`=)
MN\`=)
HandleAH
ProcAM(!9u
pliI@3dll@!8~pt
mOnHGlobal
wsprintfA
WINHTTP\%7
t7Kt'Kt
3fBDB0![|ba
uM$a6
!An_[B^
MsC*atBWo
L"E1B$'D
Par"'<&'8&'4&'1M`
l$'4!D
#m`!'0&',&'(&'$&'"L%D
#'D&'@&'<&'8&'4&'0&',"'(
B`.r&'$&' &'
8%'P#'L@
kernel32.dll
LoadLibraryA
GetProcAddress
H@A4H@E8
d.dllh
dlloch
\Pu8@jMHEP
EEE@<MD
EE+PPj
Ek(PuUf
u@E@<MD
u8@ 3@t$
E3@t-8
Ek(PuU
^#[]UM
TCP
No TCP connections recorded.
UDP
| Source |
Source Port |
Destination |
Destination Port |
| 192.168.56.101 |
53179 |
224.0.0.252 |
5355 |
| 192.168.56.101 |
49642 |
224.0.0.252 |
5355 |
| 192.168.56.101 |
137 |
192.168.56.255 |
137 |
| 192.168.56.101 |
61714 |
114.114.114.114 |
53 |
| 192.168.56.101 |
61714 |
8.8.8.8 |
53 |
| 192.168.56.101 |
56933 |
8.8.8.8 |
53 |
| 192.168.56.101 |
138 |
192.168.56.255 |
138 |
| 192.168.56.101 |
58485 |
114.114.114.114 |
53 |
| 192.168.56.101 |
57665 |
114.114.114.114 |
53 |
HTTP & HTTPS Requests
No HTTP requests performed.
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
Snort Alerts
No Snort Alerts
Sorry! No dropped buffers.