Advertisement
paladin316

Exes_e5233f45f3dd7bfeab36f388219c10d2_dll_2019-08-18_14_40.txt

Aug 18th, 2019
1,283
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.18 KB | None | 0 0
  1.  
  2. * MalFamily: "MSShellcode"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Exes_e5233f45f3dd7bfeab36f388219c10d2.dll"
  7. * File Size: 5120
  8. * File Type: "PE32 executable (DLL) (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "94543f02145c8cbc924fe6a4229b16f3b1d2988c6db4b66df5cd766322982f93"
  10. * MD5: "e5233f45f3dd7bfeab36f388219c10d2"
  11. * SHA1: "5ef0f63f00004c8b6d923adf1256f7e4cb250478"
  12. * SHA512: "06c805bfea9e62cee3c2455e56b543102d8f00b75bac7683b26d449654a6448b5c32fe165cb5f7f25deaf949c58220dec88011cad2036038f9ac2dbc4fdfd2a9"
  13. * CRC32: "44C4E284"
  14. * SSDEEP: "24:ev1GSFGFajE/K3tQ3zSaJ2IkM6Pv617s3h/LjpKpuMAmwyhZocd+:qFGFajFK3zSIe7h/TMXhZocd+"
  15.  
  16. * Process Execution:
  17. "rundll32.exe",
  18. "rundll32.exe"
  19.  
  20.  
  21. * Executed Commands:
  22. "rundll32.exe"
  23.  
  24.  
  25. * Signatures Detected:
  26.  
  27. "Description": "Behavioural detection: Injection (Process Hollowing)",
  28. "Details":
  29.  
  30. "Injection": "rundll32.exe(1488) -> rundll32.exe(2376)"
  31.  
  32.  
  33.  
  34.  
  35. "Description": "Executed a process and injected code into it, probably while unpacking",
  36. "Details":
  37.  
  38. "Injection": "rundll32.exe(1488) -> rundll32.exe(2376)"
  39.  
  40.  
  41.  
  42.  
  43. "Description": "Behavioural detection: Injection (inter-process)",
  44. "Details":
  45.  
  46.  
  47. "Description": "File has been identified by 52 Antiviruses on VirusTotal as malicious",
  48. "Details":
  49.  
  50. "Bkav": "W32.BuritecLTO.Trojan"
  51.  
  52.  
  53. "MicroWorld-eScan": "Generic.RozenaA.500137E6"
  54.  
  55.  
  56. "FireEye": "Generic.mg.e5233f45f3dd7bfe"
  57.  
  58.  
  59. "CAT-QuickHeal": "Trojan.Dorv.S363011"
  60.  
  61.  
  62. "McAfee": "Trojan-FHMQ!E5233F45F3DD"
  63.  
  64.  
  65. "AegisLab": "Trojan.Win32.Generic.lB6l"
  66.  
  67.  
  68. "CrowdStrike": "win/malicious_confidence_100% (D)"
  69.  
  70.  
  71. "BitDefender": "Generic.RozenaA.500137E6"
  72.  
  73.  
  74. "K7GW": "Trojan ( 004b76a21 )"
  75.  
  76.  
  77. "K7AntiVirus": "Trojan ( 004b76a21 )"
  78.  
  79.  
  80. "Invincea": "heuristic"
  81.  
  82.  
  83. "Baidu": "Win32.Trojan.Kryptik.sv"
  84.  
  85.  
  86. "F-Prot": "W32/S-4213a17e!Eldorado"
  87.  
  88.  
  89. "Symantec": "Meterpreter"
  90.  
  91.  
  92. "APEX": "Malicious"
  93.  
  94.  
  95. "Paloalto": "generic.ml"
  96.  
  97.  
  98. "ClamAV": "Win.Trojan.MSShellcode-7"
  99.  
  100.  
  101. "Kaspersky": "HEUR:Trojan.Win32.Generic"
  102.  
  103.  
  104. "ViRobot": "Backdoor.Win32.Agent.5120.M"
  105.  
  106.  
  107. "Rising": "HackTool.Swrort!1.6477 (CLASSIC)"
  108.  
  109.  
  110. "Ad-Aware": "Generic.RozenaA.500137E6"
  111.  
  112.  
  113. "Emsisoft": "Generic.RozenaA.500137E6 (B)"
  114.  
  115.  
  116. "Comodo": "TrojWare.Win32.Dorv.G@76w20b"
  117.  
  118.  
  119. "F-Secure": "Trojan.TR/Hijacker.Gen"
  120.  
  121.  
  122. "DrWeb": "Trojan.Inject1.41928"
  123.  
  124.  
  125. "Zillya": "Trojan.Kryptik.Win32.702434"
  126.  
  127.  
  128. "TrendMicro": "TROJ_SWRORT.SMDSA"
  129.  
  130.  
  131. "McAfee-GW-Edition": "Trojan-FHMQ!E5233F45F3DD"
  132.  
  133.  
  134. "Trapmine": "malicious.high.ml.score"
  135.  
  136.  
  137. "Sophos": "Troj/Swrort-W"
  138.  
  139.  
  140. "Ikarus": "Trojan.Win32.Swrort"
  141.  
  142.  
  143. "Cyren": "W32/S-4213a17e!Eldorado"
  144.  
  145.  
  146. "Jiangmin": "Backdoor.Generic.aahy"
  147.  
  148.  
  149. "MaxSecure": "Trojan.Malware.7164915.susgen"
  150.  
  151.  
  152. "Avira": "TR/Hijacker.Gen"
  153.  
  154.  
  155. "Antiy-AVL": "TrojanBackdoor/Win32.AGeneric"
  156.  
  157.  
  158. "Endgame": "malicious (high confidence)"
  159.  
  160.  
  161. "Arcabit": "Generic.RozenaA.500137E6"
  162.  
  163.  
  164. "ZoneAlarm": "HEUR:Trojan.Win32.Generic"
  165.  
  166.  
  167. "Microsoft": "Trojan:Win32/Dorv.C!rfn"
  168.  
  169.  
  170. "AhnLab-V3": "Trojan/Win32.Dorv.R284512"
  171.  
  172.  
  173. "Acronis": "suspicious"
  174.  
  175.  
  176. "ALYac": "Generic.RozenaA.500137E6"
  177.  
  178.  
  179. "VBA32": "TrojanDropper.Injector"
  180.  
  181.  
  182. "ESET-NOD32": "a variant of Win32/Inject.NJV"
  183.  
  184.  
  185. "TrendMicro-HouseCall": "TROJ_SWRORT.SMDSA"
  186.  
  187.  
  188. "Yandex": "Trojan.DownLoader!"
  189.  
  190.  
  191. "SentinelOne": "DFI - Malicious PE"
  192.  
  193.  
  194. "eGambit": "Trojan.Generic"
  195.  
  196.  
  197. "GData": "Generic.RozenaA.500137E6"
  198.  
  199.  
  200. "Panda": "Generic Suspicious"
  201.  
  202.  
  203. "Qihoo-360": "HEUR/QVM40.1.377D.Malware.Gen"
  204.  
  205.  
  206.  
  207.  
  208. "Description": "Clamav Hits in Target/Dropped/SuriExtracted",
  209. "Details":
  210.  
  211. "target": "clamav:Win.Trojan.MSShellcode-7, sha256:94543f02145c8cbc924fe6a4229b16f3b1d2988c6db4b66df5cd766322982f93, type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows"
  212.  
  213.  
  214.  
  215.  
  216.  
  217. * Started Service:
  218.  
  219. * Mutexes:
  220.  
  221. * Modified Files:
  222.  
  223. * Deleted Files:
  224.  
  225. * Modified Registry Keys:
  226.  
  227. * Deleted Registry Keys:
  228.  
  229. * DNS Communications:
  230.  
  231. * Domains:
  232.  
  233. * Network Communication - ICMP:
  234.  
  235. * Network Communication - HTTP:
  236.  
  237. * Network Communication - SMTP:
  238.  
  239. * Network Communication - Hosts:
  240.  
  241. "country_name": "China",
  242. "ip": "193.112.160.173",
  243. "inaddrarpa": "",
  244. "hostname": ""
  245.  
  246.  
  247.  
  248. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement