0.9
低危

25ac16610a198f9dfe89b806a6752ec76037203f8e221a4c7df18e7eeb0417ee

25ac16610a198f9dfe89b806a6752ec76037203f8e221a4c7df18e7eeb0417ee.exe

分析耗时

195s

最近分析

360天前

文件大小

18.0KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN RAZY
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.52
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:PWSX-gen [Trj] 20200728 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_70% (D) 20190702 1.0
Kingsoft None 20200728 2013.8.14.323
McAfee GenericRXKN-ME!C793FDAD6896 20200728 6.0.6.653
Tencent None 20200728 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 47 个反病毒引擎识别为恶意 (47 个事件)
ALYac Gen:Variant.Razy.686197
APEX Malicious
AVG Win32:PWSX-gen [Trj]
Ad-Aware Gen:Variant.Razy.686197
AhnLab-V3 Trojan/Win32.Stealer.C4089074
Antiy-AVL Trojan[PSW]/MSIL.Stealer
Arcabit Trojan.Razy.DA7875
Avast Win32:PWSX-gen [Trj]
Avira HEUR/AGEN.1134262
BitDefender Gen:Variant.Razy.686197
BitDefenderTheta Gen:NN.ZemsilF.34138.bm0@au7Gtfc
CAT-QuickHeal Trojan.MsilFC.S14876647
Comodo TrojWare.MSIL.PSW.Agent.DSA@8rmdbs
CrowdStrike win/malicious_confidence_70% (D)
Cybereason malicious.01281b
Cynet Malicious (score: 85)
Cyren W32/MSIL_Agent.BIL.gen!Eldorado
DrWeb Trojan.PWS.DiscordNET.24
ESET-NOD32 MSIL/PSW.Discord.FE
Emsisoft Gen:Variant.Razy.686197 (B)
Endgame malicious (high confidence)
F-Prot W32/MSIL_Agent.BIL.gen!Eldorado
F-Secure Heuristic.HEUR/AGEN.1134262
FireEye Generic.mg.c793fdad689656ce
Fortinet MSIL/Agent.RMF!tr
GData Gen:Variant.Razy.686197
Ikarus Trojan.MSIL.PSW
Invincea heuristic
Jiangmin Trojan.PSW.MSIL.yeg
K7AntiVirus Password-Stealer ( 00566a2e1 )
K7GW Password-Stealer ( 00566a2e1 )
Kaspersky HEUR:Trojan-PSW.MSIL.Agent.gen
MAX malware (ai score=86)
Malwarebytes Spyware.PasswordStealer
McAfee GenericRXKN-ME!C793FDAD6896
MicroWorld-eScan Gen:Variant.Razy.686197
Microsoft PWS:MSIL/Dcstl.GA!MTB
Qihoo-360 HEUR/QVM03.0.E04E.Malware.Gen
Rising Stealer.Agent!8.C2 (TFE:dGZlOgwjcBlMk9FZ0w)
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Mal/Disteal-K
Symantec ML.Attribute.HighConfidence
VBA32 TScope.Trojan.MSIL
Yandex Trojan.PWS.Agent!8j7JHcZBd/c
Zillya Trojan.Agent.Win32.1328637
ZoneAlarm HEUR:Trojan-PSW.MSIL.Agent.gen
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-07-29 04:39:17

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00003ca4 0x00003e00 5.593624778672833
.rsrc 0x00006000 0x00000600 0x00000600 4.076916304110733
.reloc 0x00008000 0x0000000c 0x00000200 0.08153941234324169

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x00006090 0x0000032c LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_MANIFEST 0x000063cc 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL None

Imports

Library mscoree.dll:
0x402000 _CorExeMain

L!This program cannot be run in DOS mode.
`.rsrc
@.reloc
lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
PADPADP
v4.0.30319
#Strings
StealerBin.exe
StealerBin
mscorlib
System
System.Net.Http
System.Management
System.Web.Extensions
System.Core
StealerBin.Properties.Resources.resources
<Module>
DigitalProductIdVersion
WinProdKeyFind
value__
UpToWindows7
Windows8AndUp
KeyDecoder
Object
RegistryKey
Microsoft.Win32
Environment
get_Is64BitOperatingSystem
OpenBaseKey
RegistryHive
RegistryView
OpenSubKey
GetValue
get_OSVersion
OperatingSystem
get_Version
Version
get_Major
get_Minor
GetWindowsProductKeyFromRegistry
GetWindowsProductKeyFromDigitalProductId
digitalProductId
digitalProductIdVersion
ArrayList
System.Collections
RuntimeHelpers
System.Runtime.CompilerServices
InitializeArray
RuntimeFieldHandle
get_Item
set_Item
String
DecodeProductKey
get_Chars
ToString
Concat
Substring
get_Length
Insert
DecodeProductKeyWin8AndUp
_savedTokens
WebClient
System.Net
CompleteOs
Chrome
StealFound
OperaGX
List`1
System.Collections.Generic
IndexOf
AddRange
IEnumerable`1
RemoveAt
ToArray
FileInfo
System.IO
Directory
Exists
DirectoryInfo
GetFiles
FileSystemInfo
get_Name
EndsWith
FindTokenfile
ReadAllBytes
Encoding
System.Text
get_UTF8
GetString
Contains
_FilePath
NameValueCollection
System.Collections.Specialized
WebException
get_Headers
WebHeaderCollection
UploadValues
get_Response
WebResponse
GetResponseStream
Stream
StreamReader
TextReader
ReadToEnd
IDisposable
Dispose
TokenCheckAcces
Exception
Convert
op_Equality
ReadAllText
Delete
StartSteal
HttpClient
Dictionary`2
TaskAwaiter`1
HttpResponseMessage
JavaScriptSerializer
System.Web.Script.Serialization
DownloadString
Deserialize
get_UserName
FormUrlEncodedContent
KeyValuePair`2
PostAsync
Task`1
System.Threading.Tasks
HttpContent
GetAwaiter
GetResult
tokenReport
ManagementObjectSearcher
ManagementObjectCollection
Enumerable
System.Linq
IEnumerable
ManagementObject
Func`2
Select
FirstOrDefault
get_NewLine
AppendAllText
SaveTokens
StringReader
StreamWriter
Enumerator
ReadLine
FileStream
FileMode
GetEnumerator
get_Current
TextWriter
WriteLine
MoveNext
RemoveDuplicatedLines
GetFolderPath
SpecialFolder
Thread
System.Threading
get_Count
StealTokenFromDiscordApp
StealTokenFromChrome
IEnumerator
System.Text.RegularExpressions
OpenText
Matches
MatchCollection
Capture
get_Value
Distinct
ToList
TokenStealer
Folder
checkLogs
StealTokenFromOpera
StealTokenFromOperaGX
.cctor
<YourFuckingLocation>k__BackingField
CompilerGeneratedAttribute
DebuggerBrowsableAttribute
System.Diagnostics
DebuggerBrowsableState
<YourFuckingCountryCode>k__BackingField
<YourFuckingISP>k__BackingField
get_YourFuckingLocation
set_YourFuckingLocation
get_YourFuckingCountryCode
set_YourFuckingCountryCode
get_YourFuckingISP
set_YourFuckingISP
YourFuckingLocation
YourFuckingCountryCode
YourFuckingISP
<>9__10_0
ManagementBaseObject
GetPropertyValue
<OperatingSystem>b__10_0
Program
STAThreadAttribute
Resources
StealerBin.Properties
resourceMan
ResourceManager
System.Resources
resourceCulture
CultureInfo
System.Globalization
GetTypeFromHandle
RuntimeTypeHandle
get_Assembly
Assembly
System.Reflection
get_ResourceManager
get_Culture
set_Culture
EditorBrowsableAttribute
System.ComponentModel
EditorBrowsableState
Culture
GeneratedCodeAttribute
System.CodeDom.Compiler
DebuggerNonUserCodeAttribute
Settings
ApplicationSettingsBase
System.Configuration
defaultInstance
get_Default
SettingsBase
Synchronized
Default
<PrivateImplementationDetails>
F28AE27DD8812234DDF5415F8A106C988C96F8937B0F08B8B22893837E8816F6
__StaticArrayInitTypeSize=48
ValueType
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
DebuggableAttribute
DebuggingModes
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
ComVisibleAttribute
System.Runtime.InteropServices
GuidAttribute
AssemblyFileVersionAttribute
TargetFrameworkAttribute
System.Runtime.Versioning
B)wCY1A)
18V6N5
3System.Resources.Tools.StronglyTypedResourceBuilder
4.0.0.0
KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator
11.0.0.0
WrapNonExceptionThrows
StealerBin
Copyright
2020
$89e097c7-84ab-46e1-ba25-3d9d5ed5d48e
1.0.0.0
.NETFramework,Version=v4.7.2
FrameworkDisplayName
.NET Framework 4.7.2
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
BCDFGHJKMPQRTVWXY2346789
SOFTWARE\Microsoft\Windows NT\CurrentVersion
DigitalProductId
Failed to get DigitalProductId from registry
BCDFGHJKMPQRTVWXY2346789
Authorization
https://discordapp.com/api/v6/invite/jjPsxg
401: Unauthorized
You need to verify your account in order to perform this action.
SOFTWARE\Microsoft\Cryptography
MachineGuid
90059c37-1320-41a4-b58d-2b75a9850d2f
https://wtfismyip.com/json
https://api.ipify.org/
https://api6.ipify.org/
content
**IP Information**
IPv4:
IPv6:
Location:
ISP:
Country Code:
**Windows Information**
**Discord Tokens**
Powered by ByteTools
username
Token Stealer v2.0
avatar_url
http://acurartm.bplaced.net/Bilder/Bytetools_Logo.png
SELECT Caption FROM Win32_OperatingSystem
Unknown
Chrome
Discord App
Opera GX
Token:
\discord\Local Storage\leveldb\
App Token not found :/
\Google\Chrome\User Data\Default\Local Storage\leveldb\
[\w-]{24}\.[\w-]{6}\.[\w-]{27}
mfa\.[\w-]{84}
\Opera Software\Opera Stable\Local Storage\leveldb\
\Opera Software\Opera GX Stable\Local Storage\leveldb\
https://discordapp.com/api/webhooks/737771074510389278/kKdRORtfxZRMq2kTwy6iT1pEoEBmgPnJKhtIf7mwraBCGPoH09tSBr0kBneexJ7xzBMB
\updatelogss.txt
Windows Key:
Caption
StealerBin.Properties.Resources
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
StealerBin
FileVersion
1.0.0.0
InternalName
StealerBin.exe
LegalCopyright
Copyright
2020
LegalTrademarks
OriginalFilename
StealerBin.exe
ProductName
StealerBin
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.