0.9
低危

25c8c8c7dabba43a6071187287d257e02d61b9513e7b5dd95a9410f861fc783e

25c8c8c7dabba43a6071187287d257e02d61b9513e7b5dd95a9410f861fc783e.exe

分析耗时

195s

最近分析

365天前

文件大小

29.2KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN BACKDOOR ABINDI
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.47
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast MSIL:Agent-BXF [Trj] 20200616 18.4.3895.0
Baidu MSIL.Backdoor.Bladabindi.a 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200616 2013.8.14.323
McAfee Trojan-FIGN 20200616 6.0.6.653
Tencent None 20200616 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (1 个事件)
host 114.114.114.114
文件已被 VirusTotal 上 58 个反病毒引擎识别为恶意 (50 out of 58 个事件)
ALYac Generic.MSIL.Bladabindi.7BADC0B6
APEX Malicious
AVG MSIL:Agent-BXF [Trj]
Ad-Aware Generic.MSIL.Bladabindi.7BADC0B6
Antiy-AVL Trojan/Win32.Unknown
Arcabit Generic.MSIL.Bladabindi.7BADC0B6
Avast MSIL:Agent-BXF [Trj]
Avira TR/Dropper.Gen
Baidu MSIL.Backdoor.Bladabindi.a
BitDefender Generic.MSIL.Bladabindi.7BADC0B6
BitDefenderTheta Gen:NN.ZemsilF.34128.bmX@aiCf3Zl
CAT-QuickHeal Backdoor.Bladabindi.AL3
ClamAV Win.Trojan.B-468
Comodo TrojWare.MSIL.Bladabindi.KX@52g0y5
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.b2d565
Cylance Unsafe
Cynet Malicious (score: 100)
Cyren W32/MSIL_Bladabindi.AU.gen!Eldorado
DrWeb Trojan.DownLoader10.19951
ESET-NOD32 a variant of MSIL/Bladabindi.AS
Emsisoft Generic.MSIL.Bladabindi.7BADC0B6 (B)
Endgame malicious (high confidence)
F-Prot W32/MSIL_Bladabindi.AU.gen!Eldorado
F-Secure Trojan.TR/Dropper.Gen
FireEye Generic.mg.e5df932b2d5650a6
Fortinet MSIL/Agent.PPV!tr
GData MSIL.Backdoor.Bladabindi.AV
Ikarus Trojan.Msil
Invincea heuristic
K7AntiVirus Trojan ( 700000121 )
K7GW Trojan ( 700000121 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=88)
Malwarebytes Trojan.Agent.MSIL
McAfee Trojan-FIGN
McAfee-GW-Edition BehavesLike.Win32.Backdoor.mm
MicroWorld-eScan Generic.MSIL.Bladabindi.7BADC0B6
Microsoft Backdoor:MSIL/Bladabindi.AJ
NANO-Antivirus Trojan.Win32.Dwn.dbxzfj
Panda Generic Malware
Qihoo-360 HEUR/QVM03.0.F012.Malware.Gen
Rising Backdoor.MSIL.Bladabindi!1.9E49 (CLASSIC)
SUPERAntiSpyware Trojan.Agent/Gen-Barys
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos Mal/Bbindi-C
Symantec Backdoor.Ratenjay
TotalDefense Win32/DotNetDl.A!generic
Trapmine suspicious.low.ml.score
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2020-03-24 23:46:05

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00006c00 0x00006c00 5.618416342111487
.rsrc 0x0000a000 0x00000400 0x00000400 3.5426138552292996
.reloc 0x0000c000 0x0000000c 0x00000200 0.06116285224115448

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x0000a058 0x000001e7 LANG_NEUTRAL SUBLANG_NEUTRAL None

Imports

Library mscoree.dll:
0x402000 _CorExeMain

L!This program cannot XSZ
`.rsrc
@.reloc
R  (
v2.0.50727
#Strings
<Module>
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
System
Object
Microsoft.VisualBasic.CompilerServices
StandardModuleAttribute
System.Threading
System.IO
FileInfo
FileStream
Microsoft.VisualBasic.Devices
Computer
System.Diagnostics
Process
System.Net.Sockets
TcpClient
MemoryStream
Conversions
ToBoolean
System.Windows.Forms
Application
get_ExecutablePath
Exception
Microsoft.VisualBasic.MyServices
RegistryProxy
ServerComputer
get_Registry
Microsoft.Win32
RegistryKey
get_CurrentUser
String
Concat
OpenSubKey
DeleteValue
ProjectData
SetProjectError
ClearProjectError
GetValue
ToString
CreateSubKey
SetValue
Boolean
Operators
CompareString
Environment
get_MachineName
get_UserName
ComputerInfo
get_Info
get_OSFullName
Replace
OperatingSystem
get_OSVersion
get_ServicePack
Microsoft.VisualBasic
Strings
CompareMethod
SpecialFolder
GetFolderPath
Contains
RegistryKeyPermissionCheck
GetValueNames
get_Length
DateTime
FileSystemInfo
get_LastWriteTime
System.Text
Encoding
get_UTF8
GetBytes
Convert
ToBase64String
FromBase64String
GetString
Random
VBMath
Randomize
get_Chars
get_Default
System.Collections.Generic
List`1
ToArray
Stream
Dispose
System.IO.Compression
GZipStream
CompressionMode
set_Position
BitConverter
ToInt32
IntPtr
op_Equality
op_Explicit
StrDup
GetProcessById
get_MainWindowTitle
Interaction
Environ
Conversion
System.Reflection
Assembly
Module
GetModules
GetTypes
get_FullName
EndsWith
get_Assembly
CreateInstance
DirectoryInfo
get_Name
ToLower
get_Directory
get_Parent
Exists
Delete
EndApp
EnvironmentVariableTarget
SetEnvironmentVariable
AppWinStyle
get_LocalMachine
FileMode
Thread
NewLateBinding
LateGet
LateSetComplex
System.Net
WebClient
System.Drawing
Graphics
Bitmap
Rectangle
GetCurrentProcess
get_Id
GetProcesses
ProcessModule
get_MainModule
FileVersionInfo
get_FileVersionInfo
get_FileDescription
get_FileName
get_ProcessName
GetVersionInfo
ParameterizedThreadStart
ToInteger
get_Message
ProcessStartInfo
get_StartInfo
set_RedirectStandardOutput
set_RedirectStandardInput
set_RedirectStandardError
set_FileName
DataReceivedEventHandler
add_OutputDataReceived
add_ErrorDataReceived
EventArgs
EventHandler
add_Exited
set_UseShellExecute
set_CreateNoWindow
ProcessWindowStyle
set_WindowStyle
set_EnableRaisingEvents
BeginErrorReadLine
BeginOutputReadLine
StreamWriter
get_StandardInput
TextWriter
WriteLine
StartsWith
DownloadData
WriteAllBytes
RuntimeHelpers
GetObjectValue
LateSet
LateCall
CompareObjectEqual
OrObject
Screen
get_PrimaryScreen
get_Bounds
get_Width
get_Height
FromImage
CopyPixelOperation
CopyFromScreen
Cursor
Cursors
get_Position
GetThumbnailImageAbort
GetThumbnailImage
System.Drawing.Imaging
ImageFormat
get_Jpeg
WriteByte
ConditionalCompareObjectEqual
GetSubKeyNames
RegistryValueKind
GetValueKind
DeleteSubKeyTree
System.Security.Cryptography
MD5CryptoServiceProvider
HashAlgorithm
ComputeHash
get_ClassesRoot
get_Users
get_Handle
Monitor
Socket
get_Client
SocketFlags
Disconnect
Connect
get_Available
Receive
LateIndexGet
NetworkStream
GetStream
ReadByte
DeleteSubKey
DebuggerStepThroughAttribute
CompilerGeneratedAttribute
STAThreadAttribute
Command
WaitForExit
System.ComponentModel
Component
OpenExisting
ThreadStart
SessionEndingEventArgs
SessionEndingEventHandler
SystemEvents
add_SessionEnding
DoEvents
ConditionalCompareObjectNotEqual
Keyboard
StringBuilder
get_LocalTime
get_ShiftKeyDown
get_CapsLock
ToUpper
ReadAllText
Remove
WriteAllText
ClassLibrary1.exe
avicap32.dll
kernel32
user32.dll
user32
mscorlib
ClassLibrary1
lastcap
.cctor
EmptyWorkingSet
hProcess
NtSetInformationProcess
processInformationClass
processInformation
processInformationLength
capGetDriverDescriptionA
wDriver
lpszName
cbName
lpszVer
GetVolumeInformation
GetVolumeInformationA
lpRootPathName
lpVolumeNameBuffer
nVolumeNameSize
lpVolumeSerialNumber
lpMaximumComponentLength
lpFileSystemFlags
lpFileSystemNameBuffer
nFileSystemNameSize
GetForegroundWindow
GetWindowThreadProcessId
lpdwProcessID
GetWindowText
GetWindowTextA
WinTitle
MaxLength
GetWindowTextLength
GetWindowTextLengthA
Plugin
ByteOfPlugin
ClassName
CompDir
getMD5Hash
GetKey
connect
_Lambda$__1
_Lambda$__2
_Lambda$__3
LastAV
LastAS
lastKey
keyboard
LogsPath
ToUnicodeEx
wVirtKey
wScanCode
lpKeyState
pwszBuff
cchBuff
wFlags
GetKeyboardState
MapVirtualKey
uMapType
GetKeyboardLayout
dwLayout
GetAsyncKeyState
VKCodeToUnicode
VKCode
_Lambda$__4
p0N\c<
WrapNonExceptionThrows
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
SGFja2Vk
Explorer.exe
ed6e2bf930f6d35b3ac57c049d10ac2c
abdo95.ddns.net
[endof]
Software\Microsoft\Windows\CurrentVersion\Run
Software\
Microsoft
Windows
yyyy-MM-dd
unknown
abcdefghijklmnopqrstuvwxyz
SystemDrive
SEE_MASK_NOZONECHECKS
netsh firewall add allowedprogram "
" ENABLE
windir
\system32\
Deleted
Started
cmd.exe
getvalue
Execute ERROR
Download ERROR
Executed As
Update ERROR
Updating To
length
netsh firewall delete allowedprogram "
Software
cmd.exe /c ping 127.0.0.1 & del "
yy/MM/dd
??/??/??
[ENTER]

DNS

Name Response Post-Analysis Lookup
dns.msftncsi.com A 131.107.255.255 131.107.255.255
dns.msftncsi.com AAAA fd3e:4f5a:5b81::1 131.107.255.255

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 56933 114.114.114.114 53
192.168.56.101 138 192.168.56.255 138

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.