0.9
低危

26afbc5d6b27d32f2de06b703409a65f0b9d1bc9adbba4185302be3ae8f927e6

26afbc5d6b27d32f2de06b703409a65f0b9d1bc9adbba4185302be3ae8f927e6.exe

分析耗时

195s

最近分析

374天前

文件大小

52.5KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN DOWNLOADER ZBOT
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.69
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba TrojanDownloader:Win32/Waski.793fac9a 20190527 0.3.0.5
Avast Win32:Malware-gen 20191018 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
Kingsoft None 20191018 2013.8.14.323
McAfee Downloader-FABV!D9C7553534EB 20191018 6.0.6.653
Tencent None 20191018 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 61 个反病毒引擎识别为恶意 (50 out of 61 个事件)
ALYac Gen:Variant.Ulise.7830
APEX Malicious
AVG Win32:Malware-gen
Acronis suspicious
Ad-Aware Gen:Variant.Ulise.7830
AhnLab-V3 Downloader/Win32.Ponik.R109832
Alibaba TrojanDownloader:Win32/Waski.793fac9a
Antiy-AVL Trojan[Spy]/Win32.Zbot
Arcabit Trojan.Ulise.D1E96
Avast Win32:Malware-gen
Avira TR/Yarwi.B.264
BitDefender Gen:Variant.Ulise.7830
CAT-QuickHeal TrojanPWS.Zbot.GO4
ClamAV Win.Malware.Upatre-6738779-0
Comodo TrojWare.Win32.TrojanDownloader.Waski.VL@5eeqcy
CrowdStrike win/malicious_confidence_100% (W)
Cybereason malicious.534eb8
Cylance Unsafe
Cyren W32/A-fbd46a8c!Eldorado
DrWeb Trojan.DownLoader11.7946
ESET-NOD32 Win32/TrojanDownloader.Waski.A
Emsisoft Gen:Variant.Ulise.7830 (B)
Endgame malicious (high confidence)
F-Prot W32/A-fbd46a8c!Eldorado
F-Secure Trojan.TR/Yarwi.B.264
FireEye Generic.mg.d9c7553534eb8d42
Fortinet W32/Waski.A!tr.dldr
GData Gen:Variant.Ulise.7830
Ikarus Trojan-Spy.Zbot
Invincea heuristic
Jiangmin TrojanSpy.Zbot.edwy
K7AntiVirus Trojan-Downloader ( 0048f6391 )
K7GW Trojan-Downloader ( 0048f6391 )
Kaspersky HEUR:Trojan.Win32.Generic
Lionic Trojan.Win32.Zbot.m0uq
MAX malware (ai score=85)
MaxSecure Trojan.Upatre.Gen
McAfee Downloader-FABV!D9C7553534EB
McAfee-GW-Edition Downloader-FABV!D9C7553534EB
MicroWorld-eScan Gen:Variant.Ulise.7830
Microsoft TrojanDownloader:Win32/Waski.A!MTB
NANO-Antivirus Trojan.Win32.Zbot.cxvokv
Paloalto generic.ml
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM10.2.425B.Malware.Gen
Rising Trojan.Waski!1.A489 (CLASSIC)
SUPERAntiSpyware Trojan.Agent/Gen-Waski
SentinelOne DFI - Malicious PE
Sophos Mal/Zbot-PY
Symantec Trojan.Zbot
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2014-05-09 13:48:05

PE Imphash

5c49f81624c1a24a540d60a2c9de3fcd

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000054a4 0x00005600 6.487109301314581
.rdata 0x00007000 0x00002ebe 0x00003000 5.4280486241221135
.data 0x0000a000 0x00002260 0x00001400 4.205218869843116
.rsrc 0x0000d000 0x00001f4c 0x00002000 4.952419662577148

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0000d1d0 0x00001a68 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_MENU 0x0000ec38 0x00000044 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_DIALOG 0x0000ed2c 0x000000b0 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_DIALOG 0x0000ed2c 0x000000b0 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_GROUP_ICON 0x0000eddc 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US None
RT_MANIFEST 0x0000edf0 0x0000015a LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library KERNEL32.DLL:
0x407000 RtlUnwind
0x407004 CloseHandle
0x407008 CreateFileW
0x40700c DecodePointer
0x407014 EncodePointer
0x40701c ExitProcess
0x407020 FlushFileBuffers
0x407028 GetACP
0x40702c GetCPInfo
0x407030 GetCommandLineW
0x407034 GetConsoleCP
0x407038 GetConsoleMode
0x40703c GetCurrentProcess
0x407040 GetCurrentProcessId
0x407044 GetCurrentThreadId
0x407048 GetFileType
0x40704c GetLastError
0x407050 GetModuleFileNameW
0x407054 GetModuleHandleExW
0x407058 GetModuleHandleW
0x40705c GetOEMCP
0x407060 GetProcAddress
0x407064 GetProcessHeap
0x407068 GetStdHandle
0x40706c GetStringTypeW
0x407074 HeapAlloc
0x407078 HeapFree
0x40707c HeapReAlloc
0x407080 HeapSize
0x407088 IsDebuggerPresent
0x407090 IsValidCodePage
0x407094 LCMapStringW
0x40709c LoadLibraryExW
0x4070a0 MultiByteToWideChar
0x4070a4 OutputDebugStringW
0x4070ac SetFilePointerEx
0x4070b0 SetLastError
0x4070b4 SetStdHandle
0x4070bc Sleep
0x4070c0 TerminateProcess
0x4070c4 TlsAlloc
0x4070c8 TlsFree
0x4070cc TlsGetValue
0x4070d0 TlsSetValue
0x4070d8 WideCharToMultiByte
0x4070dc WriteConsoleW
0x4070e0 WriteFile
0x4070e4 HeapSetInformation
0x4070e8 GetStartupInfoW
0x4070f0 SetHandleCount
0x4070fc HeapCreate
0x407100 GetTickCount
0x407104 LoadLibraryW
Library ole32.dll:
0x407114 CoInitializeEx
0x407118 CoCreateInstance
Library USER32.dll:
0x40710c GetSystemMetrics

L!This program cannot be run in DOS mode.
`.rdata
@.data
u:j?/O
PyE[_^
G%EoLU
+#O;uP
xr_ |r_
9#+VWSu
{HIII;
M}MVZPq@
QcWYY+
$$SY$Q+
YY]jXh@
8csmu*x
YYuTVWh.@
3]j h@
3PPPPP
@Y<v*V
^SSSSSyj
;tFtA3
S^`N`H
j$Y~\d9
QY^`[_^]
3Y[_^5@
3PPPPPf
UQV3W}
ft;uf t
Bf8\tf8"u8
ft$9Uu
UQQSVWh
V33Sf0@
[]YY?sJM
_[^SVW
j@j ^V
H3H/5@@
;rSWf9M
YYt:V5@
YF\=p@
43_V5`p@
YYt0V5@
1E3PeuEEEEd
Y__^[]Q
E_^[]E
9csmu)=0@
E3E3;u
F$|3@_^
h3G}39
Y+t"+t
+tY+uC}
Uw\]Yp
u>OdMGd
uwdSUY
ffffffE
3PPPPP
B(;r3_^[]
1E3PEd
tAt2t$
3M_^3[
ft'Ou"+
jPfDJXdf
^06_^]
YYu,9E
u_^]UWVu
DDDDDDDDDDDDDD
USV5p@
3W;to=H@
bYY~PE
P=Y9_t
t4V0;t(W8jYt
Fpt"~l
lVYYYEE
WPWPWv
whu;58@
8]tEMap<u
TM_^3[j
Y^hS=p@
3SVWT$
URPQQhR@
t;T$4t
;v.4v\
UVWS33333[_^]
33333USVWj
_^[]Ul$
woVW=D@
-0&0_^
-Y3MW0u
FGIuX^_]
R6Kv Cv$;v(3v,+v0#v4
@v@vDvHvLvPvTvXv\v`vdvhvlvpvtvxv|@
PYv4;5|@
PIYF ;
P7YF$;
P%YF8;
PYvL;5@
S3VW;~E
@;u+H;}
39](SSu
]9]tWuu
};~Bj3X
3;t?uWuuu
t"SS9] u
EWYuEYe_^[M3
M7u(Eu$u u
ES3VW]9]
39] SSu
ESgEYe_^[M3
MapUSVWUj
P(RP$R
t:|$,t
;t$,v-4v
UQPXY]Y[
KuZUQL$
mQeher
@Lod d
P2seYs
l32.L
Sizl2t
^_1k2Q
3AWe4P42
3 3$2!2
ls44r4
)594
riftDe
`{"SSp`4
rpwZ|t__^
ZKU3f+
s_l0EwI1M
`TKfE^
rhl0EnI'M
SZ$RQHVY
shk0EwI6M
`UJfE_
r$U?qC
`n[ EMG
VYU8QlaUC
T$t#"lOBU?E
WYr}f=^S
3PPSMu
M^[_VVS]+o
E5%w3uWvAEh
E-UKf;u!
>[s5>[j
CorExitProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
KERNEL32.DLL
ole32.dll
USER32.dll
RtlUnwind
CloseHandle
CreateFileW
DecodePointer
DeleteCriticalSection
EncodePointer
EnterCriticalSection
ExitProcess
FlushFileBuffers
FreeEnvironmentStringsW
GetACP
GetCPInfo
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileType
GetLastError
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
MultiByteToWideChar
OutputDebugStringW
QueryPerformanceCounter
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WideCharToMultiByte
WriteConsoleW
WriteFile
HeapSetInformation
GetStartupInfoW
GetEnvironmentStringsW
SetHandleCount
InterlockedIncrement
InterlockedDecrement
HeapCreate
GetTickCount
LoadLibraryW
CoInitializeEx
CoCreateInstance
GetSystemMetrics
eFi`NZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
'''''''''''''''''''''''''''(
]\44]]
DE--IG
_a66:=?AOP(&
;:}|_`a
ZZjiLIECC?bba
urjkst"
om=;&'
[Y}~}~
:7ca__rr
@APP`_kl
!     
tsjjhi
   
#""!"!"!"!"!"!"!"!"!"!"!"!"!"!"!"!"!"!"!"!"!"!"!"!
%%('('('('('('('$$##$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#! ][
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>PA
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
@Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
KERNEL32.DLL
WUSER32.DLL
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
((((( H
h(((( H
H
@@@@@@@@@@@@@@
IDD_DLG1
IDD_DLG2
&About
License Info
Microsoft Sans Serif
License Info
Microsoft Sans Serif
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\6Qkg2winQ.exe
C:\91ac020c1d2299b49753edc91831f8b1f282c38e89b9d4f23089b74415f7a7ac
C:\2fd8b1d491d49110d5ed3ef4d677fd9d8baf7ce6c17911618df14731786dd966
C:\ccbccd7a6488502f1d9afc2eeb16a6602418cefece35149a75522f550b1c7622
C:\vXp5IpDk.exe
C:\gSaFMxvh.exe
C:\4eM1Muvp.exe
C:\qZ8KzEE5.exe
C:\gzAo4TSO.exe
C:\9JOvIxUv.exe
C:\vCrLNqhP.exe
C:\FlZHI7sJ.exe
C:\q6k_Zo2_.exe
C:\bUCtMSlo.exe
C:\ODlR0lgm.exe
C:\nxav3rSE.exe
C:\Iw82Bg9b.exe
C:\7ztQCcuv.exe
C:\A5Npv3SB.exe
C:\X8JMmkSu.exe
C:\9eBOAyM2.exe
C:\9PrbYSJO.exe
C:\w3vDQxow.exe
C:\CSGowVI1.exe
C:\M4hnLzk6.exe
C:\IIly2pxN.exe
C:\NtD71EcV.exe
C:\o4oxHyhO.exe
C:\8K9N0pwV.exe
C:\pwYINmM3.exe
C:\c_sbbG9X.exe
C:\jTo7hKCW.exe
C:\tovYBoO6.exe
C:\iwU9Hpd_.exe
C:\cmvcCqGz.exe
C:\WxsHwsC6.exe
C:\t5tK4mmj.exe
C:\GbqbA9HB.exe
C:\BNWAF9xp.exe
C:\Dy1lvj06.exe
C:\aXTQwoO3.exe
C:\V39kvu9e.exe
C:\VddNoYdi.exe
C:\QIOXJVDY.exe
C:\2V3HYmly.exe
C:\rm0DuSO3.exe
C:\_5krwnr9.exe
C:\2zv2Lzy8.exe
C:\ot2g8Klh.exe
C:\mhiEljzO.exe
C:\DXI28VVf.exe
C:\_liW9dcc.exe
C:\baMfMo6M.exe
C:\_sT_Wn4i.exe
C:\rKK2C3dz.exe
C:\QVgblZB2.exe
C:\wTgWDApf.exe
C:\Dc70vzZT.exe
C:\AyElIIxY.exe
C:\wL1uzDeG.exe
C:\8YI4HbOz.exe
C:\TAKyattu.exe
C:\Users\admin\Downloads\important_document.exe
C:\bNuUq2s_.exe
C:\8847363407582bc1a9df4777c40a3d921188847a16ee5d02e7b6bc9f0b9adc00
C:\Users\admin\Downloads\important_document.exe
C:\Users\admin\Downloads\factura.exe
C:\72079a1fe3e358c6ab8ecbec864343e63166ff75fa436a488dff07a38dc2f52f
C:\Z2bbFfMs.exe
C:\Users\admin\Downloads\factura.exe
C:\Users\Petra\AppData\Local\Temp\updpdf.pe32
C:\fetsZKob.exe
C:\Users\admin\Downloads\sample.exe
C:\Users\Petra\AppData\Local\Temp\updpdf.pe32
C:\0d48c2142f5f6ea59ed3976db877371fe9eddeb9440cf3938458b1834ff67b42
C:\ljCNj8Ha.exe
C:\Users\admin\Downloads\invoice.exe
C:\Armd3VYu.exe
C:\044b15cdb2ad00d0787651fb1d0052dd4630c6b2730b5d9b33b91600d27e9b75
C:\c51ba3cd2fe69f114a977b327e4bd05e0cc04c31fa6888fc49ecb487949b1dc8
C:\82bc9ea802a273243a1f38d99021487b2f92493c9a55325ca4bfc47934149af0
C:\Ej1BWJWI.exe
C:\Users\admin\Downloads\cca6d99cd4ca100194ac7c72baad7eb2.virus.exe
C:\e8ec958bfa2c6b2bd9afb6b16fb1d4cd6b55d36f488afd06405c5880e57d6aae
C:\ad9153dc5269a9b7856e7089617033df5269d3d44ce816f3e6d7d52b0d9afbb7
C:\026b46cf4fe3f50037b8f81548a4984798d352e6222709dd76deeb8edd76be23
C:\f0ee051003a98c33cccb6183066ca032604d6333c040632379b97b546cb65790
C:\Users\admin\Downloads\updpdf.exe
C:\2debfc13ef46ecfd5cfcbed835933eab3aab51654cd9d60a0dc565022a7b04f4

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.