分析类型 | 虚拟机标签 | 开始时间 | 结束时间 | 持续时间 |
---|---|---|---|---|
文件 (Windows) | win7-sp1-x64-hpdapp01-1 | 2020-01-18 15:22:53 | 2020-01-18 15:25:17 | 144 秒 |
文件名 | KMSPico 11.1.2.exe |
---|---|
文件大小 | 3741040 字节 |
文件类型 | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 5473330b7d2ea5d6f331d9a1dcc2c173 |
SHA1 | e1d70c8b754c9fd4fbf9a75e1b72606fb85de168 |
SHA256 | 3dca25cb1ca99ba8bf79bf5e0d3e2486e706f031a3e52beb4e65d93f68a69198 |
SHA512 | 61cc6c22bb734537e425edd422afcdb653d5781f905a531514f3e1df86f733bf2ded93f3e23f9e7cae1aaaf9dbdaf94738b4b1d00c971b71a481988422f1c842 |
CRC32 | B787060C |
Ssdeep | 49152:BQc1ptwmKVizny/Zmc5LE5riVZWlgPZd7Qul7sdgYujiP7EnAVC55n6R+Xpbsg9K:BQSrZ+ZIirxd7Q87s0ONoiR+Xpbsbkq |
Yara | 登录查看Yara规则 |
样本下载 提交误报 |
无主机纪录.
无域名信息.
初始地址 | 0x00400000 |
---|---|
入口地址 | 0x00401d20 |
声明校验值 | 0x00000000 |
实际校验值 | 0x0039851d |
最低操作系统版本要求 | 4.0 |
编译时间 | 2011-02-01 01:44:13 |
载入哈希 | d221b1dc8c3a08622f6512e7876527c8 |
名称 | 虚拟地址 | 虚拟大小 | 原始数据大小 | 特征 | 熵(Entropy) |
---|---|---|---|---|---|
.text | 0x00001000 | 0x00000eac | 0x00001000 | IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ | 5.94 |
.rdata | 0x00002000 | 0x00000488 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 1.73 |
.data | 0x00003000 | 0x00000560 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE | 1.01 |
.gentee | 0x00004000 | 0x0000f4e8 | 0x00010000 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 7.89 |
.rsrc | 0x00014000 | 0x00007bbc | 0x00008000 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 6.47 |
偏移量 | 0x0001c000 |
大小 | 0x00375570 |
防病毒引擎/厂商 | 病毒名/规则匹配 | 病毒库日期 |
---|---|---|
Bkav | 未发现病毒 | 20200115 |
MicroWorld-eScan | Trojan.Agent.EBXD | 20200116 |
CMC | 未发现病毒 | 20190321 |
CAT-QuickHeal | Trojan.Biodata | 20200115 |
McAfee | Artemis!5473330B7D2E | 20200116 |
Cylance | Unsafe | 20200116 |
Zillya | Trojan.Biodata.Win32.6073 | 20200115 |
Sangfor | Malware | 20200114 |
K7AntiVirus | Trojan ( 0055cd271 ) | 20200116 |
Alibaba | Trojan:Win32/Biodata.93a5b4bc | 20190527 |
K7GW | Trojan ( 0055cd271 ) | 20200116 |
CrowdStrike | win/malicious_confidence_80% (D) | 20190702 |
Invincea | heuristic | 20191211 |
Baidu | 未发现病毒 | 20190318 |
F-Prot | W32/Adload.CI.gen!Eldorado | 20200116 |
ESET-NOD32 | a variant of Generik.PZWDWD | 20200116 |
APEX | Malicious | 20200116 |
Paloalto | generic.ml | 20200116 |
ClamAV | 未发现病毒 | 20200115 |
Kaspersky | Trojan.Win32.Biodata.dqzm | 20200115 |
BitDefender | Trojan.Agent.EBXD | 20200116 |
NANO-Antivirus | 未发现病毒 | 20200116 |
ViRobot | 未发现病毒 | 20200116 |
SUPERAntiSpyware | 未发现病毒 | 20200112 |
Avast | Win32:Trojan-gen | 20200116 |
Tencent | Win32.Trojan.Biodata.Suxn | 20200116 |
Endgame | malicious (high confidence) | 20190918 |
Sophos | Mal/Generic-S | 20200116 |
Comodo | Malware@#2oebzbxgdl8yv | 20200116 |
F-Secure | Trojan.TR/AD.IStartSurf.acgll | 20200116 |
DrWeb | Trojan.MulDrop9.52891 | 20200116 |
VIPRE | Trojan.Win32.Generic.pak!cobra | 20200116 |
TrendMicro | TROJ_GEN.R011C0GL619 | 20200116 |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.wc | 20200116 |
Fortinet | W32/Malicious_Behavior.VEX | 20200116 |
Trapmine | malicious.high.ml.score | 20191216 |
FireEye | Generic.mg.5473330b7d2ea5d6 | 20200116 |
Emsisoft | Trojan.Agent.EBXD (B) | 20200116 |
Ikarus | Trojan.SuspectCRC | 20200115 |
Cyren | W32/Adload.CI.gen!Eldorado | 20200116 |
Jiangmin | 未发现病毒 | 20200116 |
Webroot | W32.Hacktool.Kms | 20200116 |
MAX | malware (ai score=83) | 20200116 |
Antiy-AVL | 未发现病毒 | 20200116 |
Kingsoft | 未发现病毒 | 20200116 |
Arcabit | Trojan.Agent.EBXD | 20200116 |
AegisLab | 未发现病毒 | 20200116 |
ZoneAlarm | Trojan.Win32.Biodata.dqzm | 20200116 |
Avast-Mobile | 未发现病毒 | 20200114 |
Microsoft | Trojan:Win32/Tiggre!rfn | 20200114 |
AhnLab-V3 | 未发现病毒 | 20200115 |
Acronis | 未发现病毒 | 20200113 |
VBA32 | 未发现病毒 | 20200115 |
ALYac | Trojan.Agent.EBXD | 20200116 |
TACHYON | 未发现病毒 | 20200116 |
Ad-Aware | Trojan.Agent.EBXD | 20200116 |
Zoner | 未发现病毒 | 20200116 |
TrendMicro-HouseCall | TROJ_GEN.R011C0GL619 | 20200116 |
Rising | Dropper.Generic!8.35E (CLOUD) | 20200116 |
Yandex | Trojan.Biodata! | 20200115 |
SentinelOne | DFI - Malicious PE | 20191218 |
eGambit | Unsafe.AI_Score_94% | 20200116 |
GData | Trojan.Agent.EBXD (2x) | 20200116 |
BitDefenderTheta | 未发现病毒 | 20200113 |
AVG | Win32:Trojan-gen | 20200116 |
Cybereason | malicious.b754c9 | 20190616 |
Panda | Trj/CI.A | 20200115 |
Qihoo-360 | Win32/Trojan.908 | 20200116 |
无主机纪录.
无TCP连接纪录.
无UDP连接纪录.
无域名信息.
无TCP连接纪录.
无UDP连接纪录.
未发现HTTP请求.
无SMTP流量.
无IRC请求.
无ICMP流量.
无 CIF 结果
Timestamp | Source IP | Source Port | Destination IP | Destination Port | Protocol | SID | Signature | Category |
---|---|---|---|---|---|---|---|---|
2020-01-18 15:24:24.674550+0800 | 209.222.30.27 | 80 | 192.168.122.201 | 49179 | TCP | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
2020-01-18 15:24:42.849963+0800 | 192.168.122.201 | 49184 | 104.24.120.153 | 80 | TCP | 2022896 | ET CURRENT_EVENTS SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 | A Network Trojan was detected |
2020-01-18 15:24:42.849963+0800 | 192.168.122.201 | 49184 | 104.24.120.153 | 80 | TCP | 2019714 | ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile | Potentially Bad Traffic |
2020-01-18 15:24:43.021874+0800 | 104.24.120.153 | 80 | 192.168.122.201 | 49184 | TCP | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
2020-01-18 15:24:49.854025+0800 | 104.18.39.90 | 80 | 192.168.122.201 | 49192 | TCP | 2020202 | ET POLICY Terse Named Filename EXE Download - Possibly Hostile | A Network Trojan was detected |
2020-01-18 15:24:50.290255+0800 | 104.18.39.90 | 80 | 192.168.122.201 | 49192 | TCP | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
Timestamp | Source IP | Source Port | Destination IP | Destination Port | Version | Issuer | Subject | Fingerprint |
---|---|---|---|---|---|---|---|---|
2020-01-18 15:24:07.551514+0800 | 192.168.122.201 | 49167 | 104.28.25.59 | 443 | TLS 1.2 | C=US, ST=CA, L=San Francisco, O=CloudFlare, Inc., CN=CloudFlare Inc ECC CA-2 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 44:a1:32:d7:27:00:c9:48:d5:64:d8:8c:91:70:84:48:af:a7:8c:0a |
2020-01-18 15:24:09.282386+0800 | 192.168.122.201 | 49169 | 104.28.25.59 | 443 | TLS 1.2 | C=US, ST=CA, L=San Francisco, O=CloudFlare, Inc., CN=CloudFlare Inc ECC CA-2 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 44:a1:32:d7:27:00:c9:48:d5:64:d8:8c:91:70:84:48:af:a7:8c:0a |
2020-01-18 15:24:10.203709+0800 | 192.168.122.201 | 49171 | 104.28.25.59 | 443 | TLS 1.2 | C=US, ST=CA, L=San Francisco, O=CloudFlare, Inc., CN=CloudFlare Inc ECC CA-2 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 44:a1:32:d7:27:00:c9:48:d5:64:d8:8c:91:70:84:48:af:a7:8c:0a |
2020-01-18 15:24:46.693009+0800 | 192.168.122.201 | 49187 | 103.88.45.51 | 443 | TLSv1 | C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA | OU=Domain Control Validated, OU=ShinoSaki DV, CN=api.ip.sb | 3a:45:a5:f2:64:df:3a:8c:8a:22:f1:92:02:3a:c9:76:90:d2:13:16 |
2020-01-18 15:24:52.220025+0800 | 192.168.122.201 | 49194 | 52.218.208.24 | 443 | TLSv1 | C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Baltimore CA-2 G2 | C=US, ST=Washington, L=Seattle, O=Amazon.com, Inc., CN=*.s3-us-west-2.amazonaws.com | e8:ee:a0:d0:24:8e:9c:2e:de:11:82:37:25:83:da:d7:5b:d0:50:4c |
2020-01-18 15:24:54.867371+0800 | 192.168.122.201 | 49200 | 104.27.143.207 | 443 | TLS 1.2 | C=US, ST=CA, L=San Francisco, O=CloudFlare, Inc., CN=CloudFlare Inc ECC CA-2 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | ca:af:f1:ee:38:c6:7f:f9:c9:e3:0d:50:cd:03:31:35:f8:92:d3:9f |
2020-01-18 15:24:58.949415+0800 | 192.168.122.201 | 49211 | 104.31.69.235 | 443 | TLS 1.2 | C=US, ST=CA, L=San Francisco, O=CloudFlare, Inc., CN=CloudFlare Inc ECC CA-2 | C=US, ST=CA, L=San Francisco, O=CloudFlare, Inc., CN=sni.cloudflaressl.com | 5a:31:5b:76:2d:dd:ea:fd:3b:ee:21:5a:c6:aa:a5:15:94:02:d6:4a |
2020-01-18 15:25:00.162270+0800 | 192.168.122.201 | 49212 | 203.208.50.68 | 443 | TLS 1.2 | C=US, O=Google Trust Services, CN=GTS CA 1O1 | C=US, ST=California, L=Mountain View, O=Google LLC, CN=*.storage.googleapis.com | 7b:bd:9c:ba:37:4d:6a:e9:8f:85:9f:2f:54:6b:5d:cf:26:e1:51:19 |
No Suricata HTTP
HTML 总结报告 (需15-60分钟同步) |
下载 |
---|
Task ID | 488310 |
---|---|
Mongo ID | 5e22b3742f8f2e4bef6378af |
Cuckoo release | 1.4-Maldun |