分析类型 | 虚拟机标签 | 开始时间 | 结束时间 | 持续时间 |
---|---|---|---|---|
文件 (Windows) | win7-sp1-x64-shaapp03-1 | 2021-04-21 19:39:29 | 2021-04-21 19:41:33 | 124 秒 |
文件名 | Steam一键上号V3.2.exe |
---|---|
文件大小 | 1519616 字节 |
文件类型 | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | a517789a09f26f330e498f10508176dd |
SHA1 | 8265172b269fec69e2a6fc52dd553219135862ba |
SHA256 | 5b2225e438cc32515e060cdfb0cf7e09e4b3acf43ee4e73d92bf88e6763b4208 |
SHA512 | bf628f009f41bae6fe792cae823266d327628e8e0c7bcf85a3fccc2db8e7fe1c9422a5e9f02fd8e30100a0389af530a84dca1c9cbeb82d4c272b699c381fcd6c |
CRC32 | C7B7624F |
Ssdeep | 24576:QMYmc/0puetykeaVLgVlXY9+G3U1fLJOOqTLnRyAjbDMO7QCC9+kXwjpXGks4VPv:QM9c/Su0ygLgTIJIfdEngo7QCCMpXGkr |
Yara | 登录查看Yara规则 |
样本下载 提交误报 |
无主机纪录.
初始地址 | 0x00400000 |
---|---|
入口地址 | 0x00621f61 |
声明校验值 | 0x00173cac |
实际校验值 | 0x00173cac |
最低操作系统版本要求 | 4.0 |
编译时间 | 2021-01-29 00:40:31 |
载入哈希 | b59603bc2546704db6802e1f0558b2a4 |
图标 | |
图标精确哈希值 | 9d1b3a7ede4c8ee146dd19f802a3e5f8 |
图标相似性哈希值 | dc4ae2ec7c3a24a5627ca70e6bda914f |
LegalCopyright | |
---|---|
FileVersion | |
Comments | |
ProductName | |
ProductVersion | |
FileDescription | |
Translation |
名称 | 虚拟地址 | 虚拟大小 | 原始数据大小 | 特征 | 熵(Entropy) |
---|---|---|---|---|---|
.text | 0x00001000 | 0x00129000 | 0x00072000 | IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE | 8.00 |
.sedata | 0x0012a000 | 0x000fa000 | 0x000fa000 | IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_NOT_PAGED|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE | 7.50 |
.idata | 0x00224000 | 0x00001000 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_NOT_PAGED|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE | 1.50 |
.rsrc | 0x00225000 | 0x00004000 | 0x00004000 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE | 2.68 |
.sedata | 0x00229000 | 0x00001000 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 7.98 |
名称 | 偏移量 | 大小 | 语言 | 子语言 | 熵(Entropy) | 文件类型 |
---|---|---|---|---|---|---|
RT_ICON | 0x00226d30 | 0x000010a8 | LANG_NEUTRAL | SUBLANG_NEUTRAL | 2.79 | data |
RT_ICON | 0x00226d30 | 0x000010a8 | LANG_NEUTRAL | SUBLANG_NEUTRAL | 2.79 | data |
RT_ICON | 0x00226d30 | 0x000010a8 | LANG_NEUTRAL | SUBLANG_NEUTRAL | 2.79 | data |
RT_ICON | 0x00226d30 | 0x000010a8 | LANG_NEUTRAL | SUBLANG_NEUTRAL | 2.79 | data |
RT_ICON | 0x00226d30 | 0x000010a8 | LANG_NEUTRAL | SUBLANG_NEUTRAL | 2.79 | data |
RT_ICON | 0x00226d30 | 0x000010a8 | LANG_NEUTRAL | SUBLANG_NEUTRAL | 2.79 | data |
RT_ICON | 0x00226d30 | 0x000010a8 | LANG_NEUTRAL | SUBLANG_NEUTRAL | 2.79 | data |
RT_ICON | 0x00226d30 | 0x000010a8 | LANG_NEUTRAL | SUBLANG_NEUTRAL | 2.79 | data |
RT_GROUP_ICON | 0x00227e64 | 0x00000014 | LANG_CHINESE | SUBLANG_CHINESE_SIMPLIFIED | 2.02 | MS Windows icon resource - 1 icon, 16x16, 16 colors |
RT_GROUP_ICON | 0x00227e64 | 0x00000014 | LANG_CHINESE | SUBLANG_CHINESE_SIMPLIFIED | 2.02 | MS Windows icon resource - 1 icon, 16x16, 16 colors |
RT_GROUP_ICON | 0x00227e64 | 0x00000014 | LANG_CHINESE | SUBLANG_CHINESE_SIMPLIFIED | 2.02 | MS Windows icon resource - 1 icon, 16x16, 16 colors |
RT_VERSION | 0x00227e78 | 0x00000244 | LANG_CHINESE | SUBLANG_CHINESE_SIMPLIFIED | 3.87 | data |
防病毒引擎/厂商 | 病毒名/规则匹配 | 病毒库日期 |
---|---|---|
Bkav | 未发现病毒 | 20210208 |
Elastic | malicious (high confidence) | 20210121 |
MicroWorld-eScan | Gen:Variant.Mikey.113531 | 20210216 |
FireEye | Generic.mg.a517789a09f26f33 | 20210216 |
CAT-QuickHeal | Trojan.Mikey | 20210216 |
ALYac | Gen:Variant.Mikey.113531 | 20210216 |
Cylance | Unsafe | 20210216 |
VIPRE | Trojan.Win32.Generic!BT | 20210216 |
AegisLab | Hacktool.Win32.Generic.lvTx | 20210216 |
Sangfor | Trojan.Win32.Save.a | 20210204 |
K7AntiVirus | Trojan ( 005239691 ) | 20210216 |
BitDefender | Gen:Variant.Mikey.113531 | 20210216 |
K7GW | Trojan ( 004b8a501 ) | 20210216 |
Cybereason | malicious.a09f26 | 20210208 |
Arcabit | Trojan.Mikey.D1BB7B | 20210216 |
BitDefenderTheta | Gen:NN.ZexaF.34574.Cv0@auMcwvmb | 20210216 |
Cyren | W32/S-e743b39f!Eldorado | 20210216 |
Symantec | ML.Attribute.HighConfidence | 20210216 |
ESET-NOD32 | a variant of Win32/Packed.NoobyProtect.G suspicious | 20210216 |
Baidu | 未发现病毒 | 20190318 |
APEX | Malicious | 20210216 |
Avast | Win32:Malware-gen | 20210216 |
ClamAV | 未发现病毒 | 20210216 |
Kaspersky | 未发现病毒 | 20210216 |
Alibaba | Packed:Win32/NoobyProtect.e003e00e | 20190527 |
NANO-Antivirus | 未发现病毒 | 20210216 |
ViRobot | 未发现病毒 | 20210216 |
Rising | Malware.Heuristic!ET#99% (RDMK:cmRtazqMi9OVgs3A6BCKMvH/d4RY) | 20210216 |
Ad-Aware | Gen:Variant.Mikey.113531 | 20210216 |
Sophos | Mal/Generic-S | 20210216 |
Comodo | TrojWare.Win32.Amtar.KNB@4wlm66 | 20210216 |
F-Secure | 未发现病毒 | 20210216 |
DrWeb | 未发现病毒 | 20210216 |
Zillya | Trojan.Nimnul.Win32.4182 | 20210216 |
TrendMicro | 未发现病毒 | 20210216 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.tc | 20210216 |
CMC | 未发现病毒 | 20210208 |
Emsisoft | Gen:Variant.Mikey.113531 (B) | 20210216 |
SentinelOne | Static AI - Malicious PE | 20210215 |
Jiangmin | 未发现病毒 | 20210216 |
MaxSecure | 未发现病毒 | 20210216 |
Avira | 未发现病毒 | 20210216 |
MAX | malware (ai score=87) | 20210216 |
Antiy-AVL | 未发现病毒 | 20210216 |
Kingsoft | Win32.Troj.Banker.(kcloud) | 20210216 |
Gridinsoft | Trojan.Heur!.03010021 | 20210216 |
Microsoft | PUA:Win32/Puasson.A!ac | 20210216 |
SUPERAntiSpyware | 未发现病毒 | 20210212 |
AhnLab-V3 | 未发现病毒 | 20210216 |
ZoneAlarm | 未发现病毒 | 20210216 |
GData | Win32.Application.PUPStudio.B | 20210216 |
Cynet | Malicious (score: 100) | 20210216 |
TotalDefense | 未发现病毒 | 20210216 |
Acronis | suspicious | 20210211 |
McAfee | Artemis!A517789A09F2 | 20210216 |
TACHYON | 未发现病毒 | 20210216 |
VBA32 | 未发现病毒 | 20210216 |
Malwarebytes | Malware.Heuristic.1003 | 20210215 |
Panda | 未发现病毒 | 20210216 |
Zoner | 未发现病毒 | 20210215 |
TrendMicro-HouseCall | TROJ_GEN.R002H0CB521 | 20210216 |
Tencent | 未发现病毒 | 20210216 |
Yandex | 未发现病毒 | 20210216 |
Ikarus | PUA.NoobyProtect | 20210216 |
eGambit | Unsafe.AI_Score_100% | 20210216 |
Fortinet | Riskware/Application | 20210216 |
Webroot | 未发现病毒 | 20210216 |
AVG | Win32:Malware-gen | 20210216 |
Paloalto | generic.ml | 20210216 |
CrowdStrike | win/malicious_confidence_100% (W) | 20210203 |
Qihoo-360 | Win32/Trojan.Generic.HxIB6F8A | 20210216 |
无主机纪录.
源地址 | 源端口 | 目标地址 | 目标端口 |
---|---|---|---|
192.168.122.201 | 49160 | 23.63.74.41 acroipm.adobe.com | 80 |
192.168.122.201 | 49161 | 58.217.250.93 meun-1300764759.cos.ap-nanjing.myqcloud.com | 443 |
源地址 | 源端口 | 目标地址 | 目标端口 |
---|---|---|---|
192.168.122.201 | 56270 | 192.168.122.1 | 53 |
192.168.122.201 | 59401 | 192.168.122.1 | 53 |
源地址 | 源端口 | 目标地址 | 目标端口 |
---|---|---|---|
192.168.122.201 | 49160 | 23.63.74.41 acroipm.adobe.com | 80 |
192.168.122.201 | 49161 | 58.217.250.93 meun-1300764759.cos.ap-nanjing.myqcloud.com | 443 |
源地址 | 源端口 | 目标地址 | 目标端口 |
---|---|---|---|
192.168.122.201 | 56270 | 192.168.122.1 | 53 |
192.168.122.201 | 59401 | 192.168.122.1 | 53 |
URI | HTTP数据 |
---|---|
URL专业沙箱检测 -> http://acroipm.adobe.com/11/rdr/CHS/win/nooem/none/message.zip | GET /11/rdr/CHS/win/nooem/none/message.zip HTTP/1.1 Accept: */* If-Modified-Since: Mon, 08 Nov 2017 08:44:36 GMT User-Agent: IPM Host: acroipm.adobe.com Connection: Keep-Alive Cache-Control: no-cache |
无SMTP流量.
无IRC请求.
无ICMP流量.
无 CIF 结果
无警报
Timestamp | Source IP | Source Port | Destination IP | Destination Port | Version | Issuer | Subject | Fingerprint |
---|---|---|---|---|---|---|---|---|
2021-04-21 19:39:53.763723+0800 | 192.168.122.201 | 49161 | 58.217.250.93 | 443 | TLS 1.2 | C=BE, O=GlobalSign nv-sa, CN=GlobalSign Organization Validation CA - SHA256 - G2 | C=CN, ST=guangdong, L=shenzhen, O=Shenzhen Tencent Computer Systems Company Limited, CN=*.cos.ap-beijing.myqcloud.com | ec:9f:f6:85:4f:6f:fb:00:46:d1:59:9f:00:a2:d4:32:01:4b:68:75 |
No Suricata HTTP
HTML 总结报告 (需15-60分钟同步) |
下载 |
---|
Task ID | 631847 |
---|---|
Mongo ID | 60800f887e769a0f70494190 |
Cuckoo release | 1.4-Maldun |