VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load
6b18f782d94871eececf16471b3b2f00    Threatbook file behavior analysis report
Virscan.org multi-engine scan report
Basic Information
file name:6b18f782d94871eececf16471b3b2f00
file type:EXEx86
Submission time:2019-02-13 01:05:04
Threat level:malicious
MD5:6b18f782d94871eececf16471b3b2f00
sha256:107dbf085a63e1e615734c983b951a6daec1b8b0ade4171b8469bbd31d6618e7
Document Threat Intelligence IOC Report
No intelligence IOC detected
Intelligence decision system
Undetected intelligence determination system







Network behavior report
domains:0
dns:0
http:0
icmp: src:192.168.122.170 dst:192.168.122.177 dport:3 sport:
icmp: src:192.168.122.170 dst:192.168.122.172 dport:3 sport:
icmp: src:192.168.122.170 dst:192.168.122.162 dport:3 sport:
icmp: src:192.168.122.170 dst:192.168.122.163 dport:3 sport:
icmp: src:192.168.122.170 dst:192.168.122.165 dport:3 sport:
icmp: src:192.168.122.170 dst:192.168.122.171 dport:3 sport:
icmp: src:192.168.122.170 dst:192.168.122.167 dport:3 sport:
Document release report
file name:WERF53D.tmp
file type:empty
file size:0
MD5:d41d8cd98f00b204e9800998ecf8427e
File process number report
Process details:0
                          
Document behavior signature report
Low risk behavior
Network correlation:Generates some ICMP traffic
Low risk behavior
General behavior:Creates a writable file in a temporary directory
Low risk behavior
General behavior:Contains ability to find and load resources of a specific module
Low risk behavior
System Environment Detection:Contains functionality to query system information
Low risk behavior
Static File Characteristics:Found potential IP address or url in binary/memory
Low risk behavior
General behavior:One or more processes crashed
Low risk behavior
System Environment Detection:Reads the active computer name
可疑行为
Reverse Engineering:Checks if process is being debugged by a debugger
可疑行为
Reverse Engineering:Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
可疑行为
General behavior:Contains functionality to enum modules
可疑行为
Anti-detection Technology:Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available
可疑行为
Anti-detection Technology:Checks adapter addresses which can be used to detect virtual network interfaces
可疑行为
Reverse Engineering:The binary likely contains encrypted or compressed data indicative of a packer
Static information
PE section table information
Section name:.text
Virtual address:0x00002000
Physical address:0x00001000
Physical size:0x0009c000
Section permissions:R-E
Section name:.rsrc
Virtual address:0x0009e000
Physical address:0x0009d000
Physical size:0x00001000
Section permissions:R--
Section name:.reloc
Virtual address:0x000a0000
Physical address:0x0009e000
Physical size:0x00001000
Section permissions:R--
PE basic information
import_hash:f34d5f2d4577ed6d9ceec516c1f5a744
time_stamp:2011-07-02 06:53:51
entry_point_section:.text
entry_point_section:.text
image_base:0x400000
entry_point:0x9d26e
PE resource information
name:RT_VERSION
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0009e058
size:0x00000254

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号