Advertisement
paladin316

836Exes_e53aa6c9a97cae175a4337644363a80e_exe_2019-09-03_15_30.txt

Sep 3rd, 2019
1,528
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.97 KB | None | 0 0
  1.  
  2. * ID: 836
  3. * MalFamily: "Trickbot"
  4.  
  5. * MalScore: 10.0
  6.  
  7. * File Name: "Exes_e53aa6c9a97cae175a4337644363a80e.exe"
  8. * File Size: 602232
  9. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  10. * SHA256: "fb027ebd4679c6c29343e95bee7f2ff234cfdc6e81bcdae5e8635600bbbc7e2a"
  11. * MD5: "e53aa6c9a97cae175a4337644363a80e"
  12. * SHA1: "91f726f79db80fc336ffd8ee66bf3417368575d8"
  13. * SHA512: "9c73745e4d731de5c1e1bde6ae682b597bb5ef9a56333a3eba9c40e22dd89a9a328911e7048a10f2c2fd1a96af5312d8f0941512c873efe7c0ecbd42a8005204"
  14. * CRC32: "8BE509EC"
  15. * SSDEEP: "12288:AoTBeHFMnV1mCVGEXSQpiVOnAZupYgp9JebiAiiIp+7Al:1EyV04GiAuK6T+7Al"
  16.  
  17. * Process Execution:
  18.  
  19. * Executed Commands:
  20.  
  21. * Signatures Detected:
  22.  
  23. "Description": "File has been identified by 24 Antiviruses on VirusTotal as malicious",
  24. "Details":
  25.  
  26. "McAfee": "Artemis!E53AA6C9A97C"
  27.  
  28.  
  29. "Malwarebytes": "Trojan.TrickBot"
  30.  
  31.  
  32. "Symantec": "Trojan Horse"
  33.  
  34.  
  35. "APEX": "Malicious"
  36.  
  37.  
  38. "Kaspersky": "Trojan-Dropper.Win32.Agent.bjyqrv"
  39.  
  40.  
  41. "Avast": "Win32:BankerX-gen Trj"
  42.  
  43.  
  44. "Tencent": "Win32.Trojan-dropper.Agent.Aihu"
  45.  
  46.  
  47. "F-Secure": "Trojan.TR/AD.Inject.gshxs"
  48.  
  49.  
  50. "DrWeb": "Trojan.DownLoad4.11971"
  51.  
  52.  
  53. "TrendMicro": "TrojanSpy.Win32.TRICKBOT.SMKA"
  54.  
  55.  
  56. "McAfee-GW-Edition": "Artemis"
  57.  
  58.  
  59. "Sophos": "Mal/Generic-S"
  60.  
  61.  
  62. "Avira": "TR/AD.Inject.gshxs"
  63.  
  64.  
  65. "Antiy-AVL": "Trojan/Win32.TrickBot"
  66.  
  67.  
  68. "Microsoft": "Trojan:Win32/Casur.A!cl"
  69.  
  70.  
  71. "ZoneAlarm": "Trojan-Dropper.Win32.Agent.bjyqrv"
  72.  
  73.  
  74. "GData": "Win32.Trojan.Agent.64XSAZ"
  75.  
  76.  
  77. "ESET-NOD32": "a variant of Win32/GenKryptik.DRJL"
  78.  
  79.  
  80. "TrendMicro-HouseCall": "TrojanSpy.Win32.TRICKBOT.SMKA"
  81.  
  82.  
  83. "Rising": "Dropper.Agent!8.2F (TFE:5:ABjGvFd6wvN)"
  84.  
  85.  
  86. "Fortinet": "W32/Kryptik.GVXY!tr"
  87.  
  88.  
  89. "Webroot": "W32.Trojan.Gen"
  90.  
  91.  
  92. "AVG": "Win32:BankerX-gen Trj"
  93.  
  94.  
  95. "Panda": "Trj/CI.A"
  96.  
  97.  
  98.  
  99.  
  100.  
  101. * Started Service:
  102.  
  103. * Mutexes:
  104.  
  105. * Modified Files:
  106.  
  107. * Deleted Files:
  108.  
  109. * Modified Registry Keys:
  110.  
  111. * Deleted Registry Keys:
  112.  
  113. * DNS Communications:
  114.  
  115. * Domains:
  116.  
  117. * Network Communication - ICMP:
  118.  
  119. * Network Communication - HTTP:
  120.  
  121. * Network Communication - SMTP:
  122.  
  123. * Network Communication - Hosts:
  124.  
  125. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement