File 0168bef14423d4e8ce4fb1b5861ac4fd8d89bd0030b3e5c50a054568d1be6b66

Size 12.9MB
Type PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
MD5 61ee95dd39c553504da494a1e5196a98
SHA1 e86a4b01de9c54e2d249852e04069f1e2653588e
SHA256 0168bef14423d4e8ce4fb1b5861ac4fd8d89bd0030b3e5c50a054568d1be6b66
SHA512
42419e7a6bbcb86de059340d219c3b021ccc1bb55a2b497d15e29405ffe926d8aaac2ea05309c8a7a4fdda2315ad0b5a8decd9e4ce35902ef0c2c7d0405933f8
CRC32 99FC9E00
ssdeep None
Yara
  • vmdetect - Possibly employs anti-virtualization techniques
  • Base64_encoded_Executable - Detects an base64 encoded executable (often embedded)
  • DebuggerException__ConsoleCtrl - (no description)
  • DebuggerException__SetConsoleCtrl - (no description)
  • SEH__vectored - (no description)
  • create_service - Create a windows service
  • network_udp_sock - Communications over UDP network
  • network_tcp_listen - Listen for incoming communication
  • network_tcp_socket - Communications over RAW socket
  • network_dns - Communications use DNS

Score

This file is very suspicious, with a score of 10 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Autosubmit

6011810

6011811

Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE Feb. 19, 2025, 11:42 a.m. Feb. 19, 2025, 11:50 a.m. 491 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-02-16 06:27:59,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpk4d6bl
2025-02-16 06:27:59,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\uMDNXtUQycdAKNwohFxLmvBzq
2025-02-16 06:27:59,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\ppuyKaRgDOQblmkMNMolIcbbEwoxlxkI
2025-02-16 06:27:59,500 [analyzer] DEBUG: Started auxiliary module Curtain
2025-02-16 06:27:59,500 [analyzer] DEBUG: Started auxiliary module DbgView
2025-02-16 06:28:00,000 [analyzer] DEBUG: Started auxiliary module Disguise
2025-02-16 06:28:00,187 [analyzer] DEBUG: Loaded monitor into process with pid 512
2025-02-16 06:28:00,187 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-02-16 06:28:00,187 [analyzer] DEBUG: Started auxiliary module Human
2025-02-16 06:28:00,187 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-02-16 06:28:00,203 [analyzer] DEBUG: Started auxiliary module Reboot
2025-02-16 06:28:00,265 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-02-16 06:28:00,265 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-02-16 06:28:00,280 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-02-16 06:28:00,280 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-02-16 06:28:00,592 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\0168bef14423d4e8ce4fb1b5861ac4fd8d89bd0030b3e5c50a054568d1be6b66.exe' with arguments '' and pid 2896
2025-02-16 06:28:00,858 [analyzer] DEBUG: Loaded monitor into process with pid 2896
2025-02-16 06:28:23,104 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Windows\System32\rrez.exe
2025-02-16 06:28:23,198 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL
2025-02-16 06:28:23,226 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL.exe
2025-02-16 06:28:23,394 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL
2025-02-16 06:28:23,424 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL.exe
2025-02-16 06:28:23,499 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE
2025-02-16 06:28:23,523 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE.exe
2025-02-16 06:28:23,582 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE
2025-02-16 06:28:23,607 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE.exe
2025-02-16 06:28:23,744 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL
2025-02-16 06:28:23,786 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL.exe
2025-02-16 06:28:23,822 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT
2025-02-16 06:28:23,851 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT.exe
2025-02-16 06:28:23,920 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
2025-02-16 06:28:23,953 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE.exe
2025-02-16 06:28:23,993 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP
2025-02-16 06:28:24,032 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP.exe
2025-02-16 06:28:24,069 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\MTEXTRA.TTF
2025-02-16 06:28:24,109 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\MTEXTRA.TTF.exe
2025-02-16 06:28:24,154 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\eqnedt32.exe.manifest
2025-02-16 06:28:24,234 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\eqnedt32.exe.manifest.exe
2025-02-16 06:28:24,398 [analyzer] INFO: Added new file to list with pid 2896 and path C:\Program Files\Common Files\Microsoft Shared\EURO\MSOEURO.DLL
2025-02-16 06:28:25,632 [analyzer] INFO: Process with pid 2896 has terminated
2025-02-16 06:28:25,632 [analyzer] INFO: Process list is empty, terminating analysis.
2025-02-16 06:28:27,055 [analyzer] INFO: Terminating remaining processes before shutdown.
2025-02-16 06:28:46,946 [analyzer] WARNING: File at path u'c:\\windows\\system32\\rrez.exe' does not exist, skip.

Cuckoo Log

2025-02-19 11:42:33,988 [cuckoo.core.scheduler] INFO: Task #5977916: acquired machine win7x6422 (label=win7x6422)
2025-02-19 11:42:33,994 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.222 for task #5977916
2025-02-19 11:42:34,494 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3323262 (interface=vboxnet0, host=192.168.168.222)
2025-02-19 11:46:25,557 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6422
2025-02-19 11:46:26,850 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6422 to vmcloak
2025-02-19 11:47:35,608 [cuckoo.core.guest] INFO: Starting analysis #5977916 on guest (id=win7x6422, ip=192.168.168.222)
2025-02-19 11:47:36,633 [cuckoo.core.guest] DEBUG: win7x6422: not ready yet
2025-02-19 11:47:41,702 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6422, ip=192.168.168.222)
2025-02-19 11:47:43,540 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6422, ip=192.168.168.222, monitor=latest, size=6660546)
2025-02-19 11:47:46,570 [cuckoo.core.resultserver] DEBUG: Task #5977916: live log analysis.log initialized.
2025-02-19 11:47:47,714 [cuckoo.core.resultserver] DEBUG: Task #5977916 is sending a BSON stream
2025-02-19 11:47:48,298 [cuckoo.core.resultserver] DEBUG: Task #5977916 is sending a BSON stream
2025-02-19 11:47:48,951 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'shots/0001.jpg'
2025-02-19 11:47:49,001 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 117221
2025-02-19 11:47:51,472 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'shots/0002.jpg'
2025-02-19 11:47:51,546 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 132077
2025-02-19 11:48:04,693 [cuckoo.core.guest] DEBUG: win7x6422: analysis #5977916 still processing
2025-02-19 11:48:13,109 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'shots/0003.jpg'
2025-02-19 11:48:13,147 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 143453
2025-02-19 11:48:14,796 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'curtain/1739683706.82.curtain.log'
2025-02-19 11:48:14,813 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 36
2025-02-19 11:48:14,823 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'shots/0004.jpg'
2025-02-19 11:48:15,045 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 133477
2025-02-19 11:48:15,061 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'sysmon/1739683707.06.sysmon.xml'
2025-02-19 11:48:15,147 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 730960
2025-02-19 11:48:15,165 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/5f78019ec59c52a6_dw20.exe'
2025-02-19 11:48:17,153 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14272443
2025-02-19 11:48:18,663 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/c3cc5401e9df1a4c_dw20.exe.exe'
2025-02-19 11:48:20,756 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14312387
2025-02-19 11:48:23,161 [cuckoo.core.guest] DEBUG: win7x6422: analysis #5977916 still processing
2025-02-19 11:48:23,476 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/83c82ac4c913a20f_eqnedt32.exe.exe'
2025-02-19 11:48:25,468 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14303171
2025-02-19 11:48:27,444 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/40ffc5676897112b_mtextra.ttf.exe'
2025-02-19 11:48:30,052 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14330819
2025-02-19 11:48:32,410 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/6b056d84feb3e7ec_eqnedt32.cnt.exe'
2025-02-19 11:48:34,525 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14327747
2025-02-19 11:48:37,721 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/befa26517975eb9b_eqnedt32.exe.manifest.exe'
2025-02-19 11:48:38,968 [cuckoo.core.guest] DEBUG: win7x6422: analysis #5977916 still processing
2025-02-19 11:48:40,593 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14259139
2025-02-19 11:48:43,691 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/802ff54d4e1a8770_eeintl.dll'
2025-02-19 11:48:45,972 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14247867
2025-02-19 11:48:48,118 [cuckoo.core.guest] INFO: win7x6422: end of analysis reached!
2025-02-19 11:48:48,185 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-02-19 11:48:48,249 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-02-19 11:48:49,703 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6422 to path /srv/cuckoo/cwd/storage/analyses/5977916/memory.dmp
2025-02-19 11:48:49,724 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6422
2025-02-19 11:48:51,170 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/f8b7e81f9fd80c63_eqnedt32.cnt'
2025-02-19 11:48:53,679 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14268347
2025-02-19 11:48:57,126 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/3df5f2bfde9c0614_eqnedt32.exe.manifest'
2025-02-19 11:48:58,661 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14219195
2025-02-19 11:49:03,190 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/5198284f1d11adfe_eqnedt32.exe'
2025-02-19 11:49:04,912 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14281659
2025-02-19 11:49:11,536 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/0a6ed692f74a6e86_eqnedt32.hlp.exe'
2025-02-19 11:49:13,120 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14246851
2025-02-19 11:49:18,313 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/2500ea887e384245_eqnedt32.hlp'
2025-02-19 11:49:20,609 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14220219
2025-02-19 11:49:28,981 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/200e26052ed78be7_msaddndr.dll.exe'
2025-02-19 11:49:31,034 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14342083
2025-02-19 11:49:42,675 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/a3dde17303f36c3f_msaddndr.dll'
2025-02-19 11:49:46,066 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14294971
2025-02-19 11:49:58,436 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/059a71e7bdef2e17_dwtrig20.exe'
2025-02-19 11:50:02,148 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14241723
2025-02-19 11:50:15,101 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/85987a1d7684b2ee_mtextra.ttf'
2025-02-19 11:50:18,131 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14283707
2025-02-19 11:50:30,262 [cuckoo.core.resultserver] DEBUG: Task #5977916: File upload for 'files/48bb343534dfb730_dwtrig20.exe.exe'
2025-02-19 11:50:32,248 [cuckoo.core.resultserver] DEBUG: Task #5977916 uploaded file length: 14288835
2025-02-19 11:50:42,329 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.222 for task #5977916
2025-02-19 11:50:42,343 [cuckoo.core.resultserver] DEBUG: Cancel <Context for BSON> for task 5977916
2025-02-19 11:50:42,349 [cuckoo.core.resultserver] DEBUG: Cancel <Context for BSON> for task 5977916
2025-02-19 11:50:42,358 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 5977916
2025-02-19 11:50:42,869 [cuckoo.core.scheduler] DEBUG: Released database task #5977916
2025-02-19 11:50:42,961 [cuckoo.core.scheduler] INFO: Task #5977916: analysis procedure completed

Signatures

Yara rules detected for file (10 events)
description Possibly employs anti-virtualization techniques rule vmdetect
description Detects an base64 encoded executable (often embedded) rule Base64_encoded_Executable
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule SEH__vectored
description Create a windows service rule create_service
description Communications over UDP network rule network_udp_sock
description Listen for incoming communication rule network_tcp_listen
description Communications over RAW socket rule network_tcp_socket
description Communications use DNS rule network_dns
Command line console output was observed (12 events)
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: https://ent34ndx3cz8k.x.pipedream.net//a?son=0&brother=115&selfhash=0168bef14423d4e8ce4fb1b5861ac4fd8d89bd0030b3e5c50a054568d1be6b66&seed=1739683681271484400&runnigfrom=C:\Users\Administrator\AppData\Local\Temp\0168bef14423d4e8ce4fb1b5861ac4fd8d89bd0030b3e5c50a054568d1be6b66.exe
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EQUATION\MTEXTRA.TTF
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EQUATION\eqnedt32.exe.manifest
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EURO\MSOEURO.DLL
console_handle: 0x0000000000000007
1 1 0
The executable contains unknown PE section names indicative of a packer (could be a false positive) (1 event)
section .symtab
Creates executable files on the filesystem (18 events)
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\eqnedt32.exe.manifest.exe
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL
file C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE
file C:\Program Files\Common Files\Microsoft Shared\EURO\MSOEURO.DLL
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP.exe
file C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE.exe
file C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE.exe
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL.exe
file C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL.exe
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT.exe
file C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE.exe
file C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL.exe
file C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL
file C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\MTEXTRA.TTF.exe
file c:\Windows\System32\rrez.exe
Raised Snort alerts (1 event)
snort ET INFO DNS Query for Webhook/HTTP Request Inspection Service (x .pipedream .net)
Raised Suricata alerts (3 events)
suricata ET INFO DNS Query for Webhook/HTTP Request Inspection Service (x .pipedream .net)
suricata TGI HUNT VulnTesting Domain (requestbin.net in DNS Lookup)
suricata ET INFO DNSBin Demo (requestbin .net) - Data Exfil
Installs itself for autorun at Windows startup (1 event)
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rrez reg_value c:\Windows\System32\rrez.exe
Detects the presence of Wine emulator (1 event)
Time & API Arguments Status Return Repeated

LdrGetProcedureAddress

ordinal: 0
function_address: 0x000007fefd977a50
function_name: wine_get_version
module: ntdll
module_address: 0x0000000076d00000
-1073741511 0
File has been identified by 13 AntiVirus engine on IRMA as malicious (13 events)
G Data Antivirus (Windows) Virus: Trojan.GenericKD.75760281 (Engine A)
Avast Core Security (Linux) Win64:Trojan-gen
C4S ClamAV (Linux) Win.Trojan.GravityRAT-6511862-0
F-Secure Antivirus (Linux) Heuristic.HEUR/AGEN.1318158 [Aquarius]
Sophos Anti-Virus (Linux) Mal/Generic-S
eScan Antivirus (Linux) Trojan.GenericKD.75760281(DB)
ESET Security (Windows) a variant of Win64/Agent.PR trojan
DrWeb Antivirus (Linux) BackDoor.GravityRAT.3
WithSecure (Linux) Trojan.TR/Spy.Gen
ClamAV (Linux) Win.Trojan.GravityRAT-6511862-0
Bitdefender Antivirus (Linux) Trojan.GenericKD.75760281
Kaspersky Standard (Windows) Trojan.Win32.Vimditator.csnp
Emsisoft Commandline Scanner (Windows) Trojan.GenericKD.75760281 (B)
File has been identified by 51 AntiVirus engines on VirusTotal as malicious (50 out of 51 events)
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.GravityRAT.4!c
tehtris Generic.Malware
Cynet Malicious (score: 100)
CAT-QuickHeal Trojan.Ghanarava.1739665184196a98
Skyhigh BehavesLike.Win64.Ransomware.rh
ALYac Trojan.GenericKD.75760281
Cylance Unsafe
VIPRE Trojan.GenericKD.75760281
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Trojan.GenericKD.75760281
K7GW Trojan ( 005539191 )
K7AntiVirus Trojan ( 005539191 )
Arcabit Trojan.Generic.D4840299
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/Agent.PR
APEX Malicious
Avast Win32:BackdoorX-gen [Trj]
ClamAV Win.Trojan.GravityRAT-6511862-0
NANO-Antivirus Trojan.Win32.GravityRAT.kvnzuc
MicroWorld-eScan Trojan.GenericKD.75760281
Rising Backdoor.GravityRAT!1.BE3F (CLASSIC)
Emsisoft Trojan.GenericKD.75760281 (B)
DrWeb BackDoor.GravityRAT.3
Zillya Trojan.Agent.Win64.3706
McAfeeD ti!0168BEF14423
CTX exe.trojan.generic
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Generic.mg.61ee95dd39c55350
Jiangmin Trojan.Agent.ceqd
Antiy-AVL Trojan/Win32.Vimditator
Kingsoft Win64.Troj.gravityrat.v
Gridinsoft Ransom.Win64.Bladabindi.oa!s1
Microsoft Trojan:Win64/GravityRat.AGRV!MTB
GData Trojan.GenericKD.75760281
Varist W32/Agent.KFQ.gen!Eldorado
AhnLab-V3 Malware/Win64.RL_Generic.R305727
McAfee Artemis!61EE95DD39C5
DeepInstinct MALICIOUS
VBA32 Backdoor.GravityRAT
Malwarebytes Generic.Malware.AI.DDS
Ikarus Trojan.Win64.Agent
Tencent Malware.Win32.Gencirc.10c09b9d
Yandex Trojan.Vimditator!/ObcJ2pldiQ
huorong Trojan/Agent.ayn
MaxSecure Trojan.Malware.121218.susgen
Fortinet W64/Agent.PR!tr
AVG Win32:BackdoorX-gen [Trj]
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.