Advertisement
paladin316

Exes_d3d0667adf9feb014831fc7849c61802_exe_2019-07-21_17_30.txt

Jul 22nd, 2019
1,274
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.52 KB | None | 0 0
  1.  
  2. * MalFamily: ""
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Exes_d3d0667adf9feb014831fc7849c61802.exe"
  7. * File Size: 53760
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "bc841509b4733bde03e9a05d268f89792fc94f8071a1659fbc7bafd063cc9802"
  10. * MD5: "d3d0667adf9feb014831fc7849c61802"
  11. * SHA1: "b965ef09554abbdb12e30145512bf302461e88ce"
  12. * SHA512: "f7e7c76b97f682c947b3ecd407f7f6f8b4f618d819e053492afde2cf1bcfcadd7593a093d4b72c8bc92167849806b4d6eabb1024486ebc509d33738456161f9c"
  13. * CRC32: "25D47046"
  14. * SSDEEP: "768:aHyEBK+o6yMPqgRDMa6RwuFQXQ/61/4Jk8gqCfFC:aHL1Rt2/BpJkkUF"
  15.  
  16. * Process Execution:
  17. "Exes_d3d0667adf9feb014831fc7849c61802.exe"
  18.  
  19.  
  20. * Executed Commands:
  21.  
  22. * Signatures Detected:
  23.  
  24. "Description": "Attempts to connect to a dead IP:Port (1 unique times)",
  25. "Details":
  26.  
  27. "IP": "23.89.210.108:10257"
  28.  
  29.  
  30.  
  31.  
  32. "Description": "A process attempted to delay the analysis task.",
  33. "Details":
  34.  
  35. "Process": "Exes_d3d0667adf9feb014831fc7849c61802.exe tried to sleep 901 seconds, actually delayed analysis time by 0 seconds"
  36.  
  37.  
  38.  
  39.  
  40. "Description": "File has been identified by 65 Antiviruses on VirusTotal as malicious",
  41. "Details":
  42.  
  43. "Bkav": "W32.Svchobst.Trojan"
  44.  
  45.  
  46. "MicroWorld-eScan": "Trojan.Dropper.YRX"
  47.  
  48.  
  49. "FireEye": "Generic.mg.d3d0667adf9feb01"
  50.  
  51.  
  52. "CAT-QuickHeal": "Trojan.Mauvaise.SL1"
  53.  
  54.  
  55. "ALYac": "Trojan.Dropper.YRX"
  56.  
  57.  
  58. "Malwarebytes": "Trojan.Agent.QSS"
  59.  
  60.  
  61. "SUPERAntiSpyware": "Trojan.Agent/Gen-Morix"
  62.  
  63.  
  64. "CrowdStrike": "win/malicious_confidence_100% (W)"
  65.  
  66.  
  67. "Alibaba": "TrojanDropper:Win32/Dorifel.91adc65e"
  68.  
  69.  
  70. "K7GW": "Trojan ( 0049587e1 )"
  71.  
  72.  
  73. "K7AntiVirus": "Trojan ( 0049587e1 )"
  74.  
  75.  
  76. "Arcabit": "Trojan.Dropper.YRX"
  77.  
  78.  
  79. "Invincea": "heuristic"
  80.  
  81.  
  82. "Baidu": "Win32.Trojan.Agent.gr"
  83.  
  84.  
  85. "F-Prot": "W32/S-d71876f0!Eldorado"
  86.  
  87.  
  88. "Symantec": "Trojan.Gen.MBT"
  89.  
  90.  
  91. "TotalDefense": "Win32/Tnega.TIYXbaD"
  92.  
  93.  
  94. "APEX": "Malicious"
  95.  
  96.  
  97. "Avast": "Win32:Nitol-B Trj"
  98.  
  99.  
  100. "ClamAV": "Win.Malware.Yoddos-6992402-0"
  101.  
  102.  
  103. "Kaspersky": "Trojan-Dropper.Win32.Dorifel.axfp"
  104.  
  105.  
  106. "BitDefender": "Trojan.Dropper.YRX"
  107.  
  108.  
  109. "NANO-Antivirus": "Trojan.Win32.Click3.ctkwdy"
  110.  
  111.  
  112. "Paloalto": "generic.ml"
  113.  
  114.  
  115. "AegisLab": "Trojan.Win32.Patched.lNhi"
  116.  
  117.  
  118. "Tencent": "Win32.Trojan-dropper.Dorifel.Wsjo"
  119.  
  120.  
  121. "Ad-Aware": "Trojan.Dropper.YRX"
  122.  
  123.  
  124. "Sophos": "Mal/Generic-S"
  125.  
  126.  
  127. "Comodo": "TrojWare.Win32.Dynamer.JLS@5s363p"
  128.  
  129.  
  130. "F-Secure": "Trojan.TR/Graftor.ytsgd"
  131.  
  132.  
  133. "DrWeb": "Trojan.Click3.28277"
  134.  
  135.  
  136. "Zillya": "Trojan.Agent.Win32.460378"
  137.  
  138.  
  139. "TrendMicro": "TROJ_YODDOS.SMR"
  140.  
  141.  
  142. "McAfee-GW-Edition": "BehavesLike.Win32.Generic.qt"
  143.  
  144.  
  145. "Emsisoft": "Trojan.Dropper.YRX (B)"
  146.  
  147.  
  148. "SentinelOne": "DFI - Malicious PE"
  149.  
  150.  
  151. "Cyren": "W32/QQhelper.C.gen!Eldorado"
  152.  
  153.  
  154. "Jiangmin": "Trojan/Generic.baish"
  155.  
  156.  
  157. "Webroot": "W32.Malware.Gen"
  158.  
  159.  
  160. "Avira": "TR/Graftor.ytsgd"
  161.  
  162.  
  163. "Antiy-AVL": "Trojan/Win32.AGeneric"
  164.  
  165.  
  166. "Microsoft": "Trojan:Win32/Togapy.A!bit"
  167.  
  168.  
  169. "Endgame": "malicious (high confidence)"
  170.  
  171.  
  172. "ViRobot": "Trojan.Win32.Ransom.53760.B"
  173.  
  174.  
  175. "ZoneAlarm": "Trojan-Dropper.Win32.Dorifel.axfp"
  176.  
  177.  
  178. "GData": "Trojan.Dropper.YRX"
  179.  
  180.  
  181. "TACHYON": "Trojan/W32.Agent.53760.AGX"
  182.  
  183.  
  184. "AhnLab-V3": "Trojan/Win32.Downloader.R97609"
  185.  
  186.  
  187. "Acronis": "suspicious"
  188.  
  189.  
  190. "McAfee": "DoS-FAR!D3D0667ADF9F"
  191.  
  192.  
  193. "MAX": "malware (ai score=96)"
  194.  
  195.  
  196. "VBA32": "BScope.Trojan.Bulta"
  197.  
  198.  
  199. "Cylance": "Unsafe"
  200.  
  201.  
  202. "Zoner": "Trojan.Win32.29069"
  203.  
  204.  
  205. "ESET-NOD32": "a variant of Win32/Agent.VOM"
  206.  
  207.  
  208. "TrendMicro-HouseCall": "TROJ_YODDOS.SMR"
  209.  
  210.  
  211. "Rising": "Trojan.Farfli!1.65C0 (CLASSIC)"
  212.  
  213.  
  214. "Yandex": "Trojan.Graftor!Yk/ayiYcGzo"
  215.  
  216.  
  217. "Ikarus": "Trojan.Win32.Togapy"
  218.  
  219.  
  220. "eGambit": "Unsafe.AI_Score_91%"
  221.  
  222.  
  223. "Fortinet": "W32/Agent.VOM!tr"
  224.  
  225.  
  226. "AVG": "Win32:Nitol-B Trj"
  227.  
  228.  
  229. "Cybereason": "malicious.adf9fe"
  230.  
  231.  
  232. "Panda": "Trj/Genetic.gen"
  233.  
  234.  
  235. "Qihoo-360": "HEUR/QVM41.2.5815.Malware.Gen"
  236.  
  237.  
  238.  
  239.  
  240. "Description": "Checks the CPU name from registry, possibly for anti-virtualization",
  241. "Details":
  242.  
  243.  
  244. "Description": "Clamav Hits in Target/Dropped/SuriExtracted",
  245. "Details":
  246.  
  247. "target": "clamav:Win.Malware.Yoddos-6992402-0, sha256:bc841509b4733bde03e9a05d268f89792fc94f8071a1659fbc7bafd063cc9802, type:PE32 executable (GUI) Intel 80386, for MS Windows"
  248.  
  249.  
  250.  
  251.  
  252. "Description": "Anomalous binary characteristics",
  253. "Details":
  254.  
  255. "anomaly": "Actual checksum does not match that reported in PE header"
  256.  
  257.  
  258.  
  259.  
  260.  
  261. * Started Service:
  262.  
  263. * Mutexes:
  264. "lz1.f3322.net:10257",
  265. "DBWinMutex"
  266.  
  267.  
  268. * Modified Files:
  269.  
  270. * Deleted Files:
  271.  
  272. * Modified Registry Keys:
  273.  
  274. * Deleted Registry Keys:
  275.  
  276. * DNS Communications:
  277.  
  278. "type": "A",
  279. "request": "lz1.f3322.net",
  280. "answers":
  281.  
  282. "data": "23.89.210.108",
  283. "type": "A"
  284.  
  285.  
  286.  
  287.  
  288.  
  289. * Domains:
  290.  
  291. "ip": "23.89.210.108",
  292. "domain": "lz1.f3322.net"
  293.  
  294.  
  295.  
  296. * Network Communication - ICMP:
  297.  
  298. * Network Communication - HTTP:
  299.  
  300. * Network Communication - SMTP:
  301.  
  302. * Network Communication - Hosts:
  303.  
  304. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement