0.9
低危

1eae81ee9a6f9066586d4fc6abc1805bcba58af2fa892ceeaab9332fb3dfd7ab

1eae81ee9a6f9066586d4fc6abc1805bcba58af2fa892ceeaab9332fb3dfd7ab.exe

分析耗时

194s

最近分析

369天前

文件大小

72.2KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN VILSEL
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.61
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Vilsel-CT [Trj] 20200123 18.4.3895.0
Baidu Win32.Trojan.VB.x 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
Kingsoft None 20200123 2013.8.14.323
McAfee Generic VB.z 20200123 6.0.6.653
Tencent Trojan.Win32.VB.ctb 20200123 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 65 个反病毒引擎识别为恶意 (50 out of 65 个事件)
ALYac Trojan.Generic.7592665
APEX Malicious
AVG Win32:Vilsel-CT [Trj]
Acronis suspicious
Ad-Aware Trojan.Generic.7592665
AhnLab-V3 Trojan/Win32.Vilsel.R1968
Arcabit Trojan.Generic.D73DAD9
Avast Win32:Vilsel-CT [Trj]
Avira TR/ATRAPS.Gen2
Baidu Win32.Trojan.VB.x
BitDefender Trojan.Generic.7592665
BitDefenderTheta AI:Packer.CCA612A91C
Bkav W32.BaragoneC.Worm
CAT-QuickHeal Trojan.VilselMF.S8128215
CMC Trojan.Win32.Vilsel!O
ClamAV Win.Trojan.Vilsel-4621
Comodo TrojWare.Win32.Trojan.Vilsel.loy0@1qq4nk
CrowdStrike win/malicious_confidence_100% (W)
Cybereason malicious.179b93
Cylance Unsafe
Cyren W32/VB.DS.gen!Eldorado
DrWeb Trojan.Copyself.102
ESET-NOD32 Win32/VB.OZA
Emsisoft Trojan.Generic.7592665 (B)
Endgame malicious (high confidence)
F-Prot W32/VB.DS.gen!Eldorado
F-Secure Trojan.TR/ATRAPS.Gen2
FireEye Generic.mg.c566ecb179b93e34
Fortinet W32/Agent.OZA!worm
GData Win32.Trojan.Vilsel.A
Ikarus Trojan.Win32.Vilsel
Invincea heuristic
Jiangmin Trojan/Vilsel.adtk
K7AntiVirus Trojan ( 00013e901 )
K7GW P2PWorm ( 000fc32e1 )
Kaspersky Trojan.Win32.Vilsel.loy
MAX malware (ai score=80)
Malwarebytes Worm.VBAgent
MaxSecure Trojan.W32.Vilsel.loy
McAfee Generic VB.z
McAfee-GW-Edition BehavesLike.Win32.Vilsel.lt
MicroWorld-eScan Trojan.Generic.7592665
Microsoft TrojanDropper:Win32/VB.IL
NANO-Antivirus Trojan.Win32.Vilsel.fwrjnb
Panda Trj/Vilsel.V
Qihoo-360 Worm.Win32.Mau.A
Rising Trojan.VB!1.BAD4 (CLASSIC)
SUPERAntiSpyware Trojan.Agent/Gen-VBInject
Sangfor Malware
SentinelOne DFI - Malicious PE
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2009-01-06 12:02:14

PE Imphash

bfbf457d52153d2191e67bb6c9212334

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000a2c0 0x0000b000 4.452522369133977
.data 0x0000c000 0x00000fb8 0x00000000 0.0
.rsrc 0x0000d000 0x00005bd0 0x00006000 4.080855996589235

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000d460 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_ICON 0x0000d460 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_ICON 0x0000d460 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_ICON 0x0000d460 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_ICON 0x0000d460 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_ICON 0x0000d460 0x00000468 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_GROUP_ICON 0x0000d404 0x0000005c LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_VERSION 0x0000d1e0 0x00000224 LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library MSVBVM60.DLL:
0x401000 MethCallEngine
0x401004 None
0x401008 None
0x40100c None
0x401010 None
0x401014 None
0x401018 None
0x40101c EVENT_SINK_AddRef
0x401020 None
0x401024 DllFunctionCall
0x401028 None
0x40102c EVENT_SINK_Release
0x401030 None
0x401034 None
0x40103c __vbaExceptHandler
0x401040 None
0x401044 None
0x401048 None
0x40104c None
0x401050 ProcCallEngine
0x401054 None
0x401058 None
0x40105c None
0x401060 None
0x401064 None
0x401068 None
0x40106c None
0x401070 None
0x401074 None
0x401078 None
0x40107c None

L!This program cannot be run in DOS mode.
sisisi
ldsiRichsi
`.data
MSVBVM60.DLL
h;RsQOsOs~OsQNs{Ps?|Ps
Ns[OsBsNOsNsNs
:RsNs$FPs}Ps
PsDROs\TPsOs5BskPs
Project1
frm_main
jjjjjjjjjjjjjjjjjjjjjjjjjj]
jjjjjjjjjjjjjjjjjjjjjjjjjj
dddddddddddddddddddddddddd
dddddddddddddddddddddddddd
__________________________r
stun$%12V44)
zzzzzzzzzzzzzzz{
Tikumn
/Z[qr
bcdddddddddef/YggggggggggggggYh
(YZZ[a((
(YYZZZ]
NEFGHK
deEFGHIyKL
12344*z
$P&'(Z
|bbbbbbbbbbbbbbb
UUUUUUUUUUUUUUUC
qrst!w@gylz///////
q`cDefE!gYjjiiijj2mnop
UUCCCDVWX
YZZ[\2^
CDEFvwJgL
23456789:<#$>
 "#$%&'()*+,
bcdefghi
WXYZ[\]^_`a
LMNOPQRSTUV
CDEFGGGHIJK
9:;<=>>?@AB
345678
$%&'()*+,-.
-kkeJ/
.nnnnnnnS8
/qqqqqqqqqqq\@$
tttttttttttttttfI3
wwwwwwwwwwwwwwwwwwwpS<
zzzzzzzzzzzzzzzzzzzzzzzz\E&
}}}}}}}}}}}}}}}}}}}}}}}}}}M
H((wf,
I33lfZ
}KUUmfh
}]WWnf
urpg\B(
qkruvwyq]J4
gpwvvvvw{}tkW=!
kt{{{{{{{z{|
s#Keq|
fvhQC7Q
~Yn_YNA^
u]O7 q
w~~xkZD'~
+j!{tp
YZ~jLwd
Timer1
VB5!*
musicvn
Microsoft Windows
Project1
Project1
frm_main
class_main
module_main
module_bind
module_rnd
module_registry
module_until
module_path
module_check
Module1
module_funny
F;M"-KZO3f
+3qC:\Program Files\Microsoft Visual Studio\VB98\VB6.OLB
Timer1
kernel32
CreateMutexA
ReleaseMutex
CloseHandle
+3q"=h
VBA6.DLL
+3qZ|4%H[x8!=h
+3qClass
C:\WINDOWS\system32\msvbvm60.dll\3
advapi32.dll
RegSetValueExA
FindWindowA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegSaveKeyA
RegRestoreKeyA
RegEnumKeyExA
RegEnumValueA
RegCreateKeyA
AdjustTokenPrivileges
user32
LookupPrivilegeValueA
OpenProcessToken
GetCurrentProcess
FindWindowExA
SendMessageA
PostMessageA
GetFileAttributesA
ExitWindowsEx
GetWindowTextA
GetWindowTextLengthA
t4ltlx
qd<ldqt2
d>P#plx*#l
pxlhdP
qh<lll
Xlhqp/l
qh<lhqp
qh<lhqp
qh<lll
Xlhqp/l
qh<lhqp
l4lllt^
qh<lll
Xlhqp/l
qh<lhqp
qh<lll
Xlhqp/l
qh<lhqp
l4lllt^
qh<lll
Xlhqp/l
qh<lhqp
q<<l<qt
q@<l4l
Xl@qt/4
qh<lll
Xlhqp/l
qh<lhqp
l4lllt^
qh<lll
Xlhqp/l
qh<lhqp
ql<lliL\/p
ql<lliL\/p
<,ltJlt
1t/plt
*1xltJ
hd`\5L
>@#`lh*#\
tXl\qp/`
hXl0qp2
tXl0qp/`
qX<l\l
XlXqp/\
qX<lXqp
H`1h5H
\4l\lllt^
hXlXqp/\
lxlh*#\
%lxlhlt
qX<lXqp
qL<lPl
XlLqp/P
qL<lLqp
<`1h5<
<`1`5<
P4lPlllt^
`XlLqp2
lxlh*#P
qL<lLqp
qT<l\l
XlTq`2
qT<lTq`
\4l\lt^
qT<l\l
XlTq`2
\4l\lt^
qL<l\l
XlLq`/\
\4l\lt^
qT<l\l
XlTq`/\
qT<lTq`
0>,#<l@*#8
<@840,
x>0#<l@*#8
q<lq/@
MSVBVM60.DLL
MethCallEngine
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ProcCallEngine
u]O7 q
w~~xkZD'~
+j!{tp
YZ~jLwd
urpg\B(
qkruvwyq]J4
gpwvvvvw{}tkW=!
kt{{{{{{{z{|
s#Keq|
fvhQC7Q
~Yn_YNA^
-kkeJ/
.nnnnnnnS8
/qqqqqqqqqqq\@$
tttttttttttttttfI3
wwwwwwwwwwwwwwwwwwwpS<
zzzzzzzzzzzzzzzzzzzzzzzz\E&
}}}}}}}}}}}}}}}}}}}}}}}}}}M
H((wf,
I33lfZ
}KUUmfh
}]WWnf
bcdefghi
WXYZ[\]^_`a
LMNOPQRSTUV
CDEFGGGHIJK
9:;<=>>?@AB
345678
$%&'()*+,-.
|bbbbbbbbbbbbbbb
UUUUUUUUUUUUUUUC
qrst!w@gylz///////
q`cDefE!gYjjiiijj2mnop
UUCCCDVWX
YZZ[\2^
CDEFvwJgL
23456789:<#$>
 "#$%&'()*+,
jjjjjjjjjjjjjjjjjjjjjjjjjj]
jjjjjjjjjjjjjjjjjjjjjjjjjj
dddddddddddddddddddddddddd
dddddddddddddddddddddddddd
__________________________r
stun$%12V44)
zzzzzzzzzzzzzzz{
Tikumn
/Z[qr
bcdddddddddef/YggggggggggggggYh
(YZZ[a((
(YYZZZ]
NEFGHK
deEFGHIyKL
12344*z
$P&'(Z
hdH, d
l\XL@\
~xkZF+
R:u]O:&
@C:\Documents and Settings\DucDun
*\AD:\Lap Trinh\Virus Mau\Pro 3\Pro3.vbp
SeRestorePrivilege
SeBackupPrivilege
Access is denied
System
HideFileExt
Software\Microsoft\Windows\CurrentVersion\Explorer
Logon User Name
Hidden
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CabinetState
FullPath
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
NoFolderOptions
Software\Microsoft\Windows\CurrentVersion\Explorer\Streams
Settings
Scripting.FileSystemObject
CreateTextFile
temp.zip
Shell.Application
Namespace
CopyHere
backup
System Restore
update
CabinetWClass
ExploreWClass
Happy BirthDay my's Boss
Merry Christmas
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
040904B0
CompanyName
ProductName
Microsoft Windows
FileVersion
1.00.0057
ProductVersion
1.00.0057
InternalName
musicvn
OriginalFilename
musicvn.exe
~xkZF+
R:u]O:&
l\XL@\
hdH, d
(5%&'37
34456:
&*/3333!!")

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.