File 6252e9f1addf8d9b83f7777fdd29624e90b70c96dbf29645a913c7f9348a0c64

Size 26.5MB
Type PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
MD5 1e8f8195ddfabe41a2f26111477e446c
SHA1 049e6a6161a8e3aceaa9541b2d188cc2ec8edc47
SHA256 6252e9f1addf8d9b83f7777fdd29624e90b70c96dbf29645a913c7f9348a0c64
SHA512
dd4b28fcd5b3aa9a54f6ab0a4f7dd252ca37a148aa3a998cc6574c968e471b04929f1d9c48445b4bfacdcab65f7a8d07612c20b976181c595b798ae6c26a6bc8
CRC32 0024C0CE
ssdeep None
Yara
  • PoetRat_Python - (no description)
  • Base64_encoded_Executable - Detects an base64 encoded executable (often embedded)
  • DebuggerException__ConsoleCtrl - (no description)
  • DebuggerException__SetConsoleCtrl - (no description)
  • SEH__vectored - (no description)
  • create_service - Create a windows service
  • network_udp_sock - Communications over UDP network
  • network_tcp_listen - Listen for incoming communication
  • network_tcp_socket - Communications over RAW socket
  • network_dns - Communications use DNS

Score

This file is very suspicious, with a score of 10 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Autosubmit

7199893

7199894

Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE Nov. 22, 2025, 12:37 a.m. Nov. 22, 2025, 12:44 a.m. 410 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-11-11 09:55:59,030 [analyzer] DEBUG: Starting analyzer from: C:\tmpmdfut4
2025-11-11 09:55:59,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\KhyoCsnVmOBUCCSqQILEFNpT
2025-11-11 09:55:59,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\uqmUyzJgmARLaQRszKPHZOdEjGL
2025-11-11 09:55:59,342 [analyzer] DEBUG: Started auxiliary module Curtain
2025-11-11 09:55:59,342 [analyzer] DEBUG: Started auxiliary module DbgView
2025-11-11 09:56:00,015 [analyzer] DEBUG: Started auxiliary module Disguise
2025-11-11 09:56:00,217 [analyzer] DEBUG: Loaded monitor into process with pid 504
2025-11-11 09:56:00,250 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-11-11 09:56:00,250 [analyzer] DEBUG: Started auxiliary module Human
2025-11-11 09:56:00,250 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-11-11 09:56:00,250 [analyzer] DEBUG: Started auxiliary module Reboot
2025-11-11 09:56:00,405 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-11-11 09:56:00,405 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-11-11 09:56:00,405 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-11-11 09:56:00,405 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-11-11 09:56:00,858 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\6252e9f1addf8d9b83f7777fdd29624e90b70c96dbf29645a913c7f9348a0c64.exe' with arguments '' and pid 2848
2025-11-11 09:56:01,140 [analyzer] DEBUG: Loaded monitor into process with pid 2848
2025-11-11 09:56:23,556 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Windows\System32\czIAPVJm.exe
2025-11-11 09:56:23,749 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL
2025-11-11 09:56:23,871 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL.exe
2025-11-11 09:56:24,033 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL
2025-11-11 09:56:24,125 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL.exe
2025-11-11 09:56:24,253 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE
2025-11-11 09:56:24,454 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE.exe
2025-11-11 09:56:24,608 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE
2025-11-11 09:56:24,733 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE.exe
2025-11-11 09:56:24,895 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL
2025-11-11 09:56:25,009 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL.exe
2025-11-11 09:56:25,158 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT
2025-11-11 09:56:25,286 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT.exe
2025-11-11 09:56:25,431 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
2025-11-11 09:56:25,605 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE.exe
2025-11-11 09:56:25,904 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP
2025-11-11 09:56:26,029 [analyzer] INFO: Added new file to list with pid 2848 and path C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP.exe
2025-11-11 09:56:26,890 [analyzer] INFO: Process with pid 2848 has terminated
2025-11-11 09:56:26,890 [analyzer] INFO: Process list is empty, terminating analysis.
2025-11-11 09:56:28,250 [analyzer] INFO: Terminating remaining processes before shutdown.
2025-11-11 09:56:32,467 [analyzer] WARNING: File at path u'c:\\windows\\system32\\cziapvjm.exe' does not exist, skip.
2025-11-11 09:56:34,421 [analyzer] INFO: Analysis completed.

Cuckoo Log

2025-11-22 00:37:50,290 [cuckoo.core.scheduler] INFO: Task #7168471: acquired machine win7x644 (label=win7x644)
2025-11-22 00:37:50,291 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.204 for task #7168471
2025-11-22 00:37:50,635 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 544720 (interface=vboxnet0, host=192.168.168.204)
2025-11-22 00:38:07,237 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x644
2025-11-22 00:38:08,176 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x644 to vmcloak
2025-11-22 00:41:19,147 [cuckoo.core.guest] INFO: Starting analysis #7168471 on guest (id=win7x644, ip=192.168.168.204)
2025-11-22 00:41:20,168 [cuckoo.core.guest] DEBUG: win7x644: not ready yet
2025-11-22 00:41:25,201 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x644, ip=192.168.168.204)
2025-11-22 00:41:25,296 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x644, ip=192.168.168.204, monitor=latest, size=6660546)
2025-11-22 00:41:29,351 [cuckoo.core.resultserver] DEBUG: Task #7168471: live log analysis.log initialized.
2025-11-22 00:41:30,510 [cuckoo.core.resultserver] DEBUG: Task #7168471 is sending a BSON stream
2025-11-22 00:41:31,353 [cuckoo.core.resultserver] DEBUG: Task #7168471 is sending a BSON stream
2025-11-22 00:41:31,921 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'shots/0001.jpg'
2025-11-22 00:41:31,945 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 117981
2025-11-22 00:41:33,083 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'shots/0002.jpg'
2025-11-22 00:41:33,096 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 132742
2025-11-22 00:41:44,023 [cuckoo.core.guest] DEBUG: win7x644: analysis #7168471 still processing
2025-11-22 00:41:54,755 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'shots/0003.jpg'
2025-11-22 00:41:54,769 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 142087
2025-11-22 00:41:55,868 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'shots/0004.jpg'
2025-11-22 00:41:55,893 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 156191
2025-11-22 00:41:57,014 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'shots/0005.jpg'
2025-11-22 00:41:57,082 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 133528
2025-11-22 00:41:58,298 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'curtain/1762851388.05.curtain.log'
2025-11-22 00:41:58,301 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 36
2025-11-22 00:41:58,493 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'sysmon/1762851388.23.sysmon.xml'
2025-11-22 00:41:58,503 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 1435792
2025-11-22 00:41:58,715 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/642c4f1bd3ff5114_eeintl.dll'
2025-11-22 00:41:58,862 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28490415
2025-11-22 00:41:59,216 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/ff185ec81d19e900_dw20.exe'
2025-11-22 00:41:59,274 [cuckoo.core.guest] DEBUG: win7x644: analysis #7168471 still processing
2025-11-22 00:41:59,368 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28412591
2025-11-22 00:41:59,624 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/d97b60add2ce065d_eqnedt32.cnt'
2025-11-22 00:41:59,762 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28457647
2025-11-22 00:42:00,017 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/f68e588785c5f488_msaddndr.dll'
2025-11-22 00:42:00,176 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28405423
2025-11-22 00:42:00,380 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/cbe0adb0e376794d_dw20.exe.exe'
2025-11-22 00:42:00,536 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28502711
2025-11-22 00:42:00,742 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/835ba2a7e2ba3523_dwtrig20.exe.exe'
2025-11-22 00:42:00,899 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28539575
2025-11-22 00:42:01,115 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/d50c3f56300580c3_eeintl.dll.exe'
2025-11-22 00:42:01,235 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28550839
2025-11-22 00:42:01,455 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/de2257ef06a72b6d_msaddndr.dll.exe'
2025-11-22 00:42:01,575 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28409527
2025-11-22 00:42:01,808 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/845f894bd84a4bb0_eqnedt32.cnt.exe'
2025-11-22 00:42:01,980 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28506807
2025-11-22 00:42:02,220 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/44bd4dcffddf2f62_dwtrig20.exe'
2025-11-22 00:42:02,371 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28447407
2025-11-22 00:42:02,578 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/10bdde46866c04bc_eqnedt32.exe'
2025-11-22 00:42:02,712 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28473007
2025-11-22 00:42:02,950 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/ce7690c7da377ebc_dbghelp.dll.exe'
2025-11-22 00:42:03,080 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28464823
2025-11-22 00:42:03,299 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/0dba8f6fa66915a1_eqnedt32.exe.exe'
2025-11-22 00:42:03,416 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28509879
2025-11-22 00:42:03,608 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/e7ff66c358aa722d_dbghelp.dll'
2025-11-22 00:42:03,745 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28433071
2025-11-22 00:42:04,082 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/08858be15c73afc9_eqnedt32.hlp.exe'
2025-11-22 00:42:04,204 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28489399
2025-11-22 00:42:04,535 [cuckoo.core.resultserver] DEBUG: Task #7168471: File upload for 'files/ed28db55a7f306c9_eqnedt32.hlp'
2025-11-22 00:42:04,669 [cuckoo.core.resultserver] DEBUG: Task #7168471 uploaded file length: 28433071
2025-11-22 00:42:04,740 [cuckoo.core.resultserver] DEBUG: Task #7168471 had connection reset for <Context for LOG>
2025-11-22 00:42:05,316 [cuckoo.core.guest] INFO: win7x644: analysis completed successfully
2025-11-22 00:42:05,337 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-11-22 00:42:05,367 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-11-22 00:42:06,587 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x644 to path /srv/cuckoo/cwd/storage/analyses/7168471/memory.dmp
2025-11-22 00:42:06,589 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x644
2025-11-22 00:44:39,217 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.204 for task #7168471
2025-11-22 00:44:39,964 [cuckoo.core.scheduler] DEBUG: Released database task #7168471
2025-11-22 00:44:39,989 [cuckoo.core.scheduler] INFO: Task #7168471: analysis procedure completed

Signatures

Yara rules detected for file (10 events)
description (no description) rule PoetRat_Python
description Detects an base64 encoded executable (often embedded) rule Base64_encoded_Executable
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule SEH__vectored
description Create a windows service rule create_service
description Communications over UDP network rule network_udp_sock
description Listen for incoming communication rule network_tcp_listen
description Communications over RAW socket rule network_tcp_socket
description Communications use DNS rule network_dns
Command line console output was observed (10 events)
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: https://ent34ndx3cz8k.x.pipedream.net//a?son=0&brother=1&selfhash=6252e9f1addf8d9b83f7777fdd29624e90b70c96dbf29645a913c7f9348a0c64&seed=1762851361680664100&runnigfrom=C:\Users\Administrator\AppData\Local\Temp\6252e9f1addf8d9b83f7777fdd29624e90b70c96dbf29645a913c7f9348a0c64.exe
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Program Files\Common Files\Microsoft Shared\EQUATION\MTEXTRA.TTF
console_handle: 0x0000000000000007
1 1 0
The executable contains unknown PE section names indicative of a packer (could be a false positive) (1 event)
section .symtab
Creates executable files on the filesystem (15 events)
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL
file C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP.exe
file C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE.exe
file C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE.exe
file C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL.exe
file C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL.exe
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT.exe
file C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
file C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE.exe
file C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL.exe
file C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL
file c:\Windows\System32\czIAPVJm.exe
Raised Snort alerts (1 event)
snort ET INFO DNS Query for Webhook/HTTP Request Inspection Service (x .pipedream .net)
Installs itself for autorun at Windows startup (1 event)
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\czIAPVJm reg_value c:\Windows\System32\czIAPVJm.exe
Detects the presence of Wine emulator (1 event)
Time & API Arguments Status Return Repeated

LdrGetProcedureAddress

ordinal: 0
function_address: 0x000007fefdf37a50
function_name: wine_get_version
module: ntdll
module_address: 0x0000000077ac0000
-1073741511 0
File has been identified by 10 AntiVirus engine on IRMA as malicious (10 events)
G Data Antivirus (Windows) Virus: Gen:Variant.Tedy.816526 (Engine A)
Avast Core Security (Linux) Win64:MalwareX-gen [Misc]
WithSecure (Linux) Trojan.TR/Spy.Gen
eScan Antivirus (Linux) Gen:Variant.Tedy.816526(DB)
ESET Security (Windows) a variant of Win64/Agent.PR trojan
Sophos Anti-Virus (Linux) Troj/Agent-BLKX
DrWeb Antivirus (Linux) BackDoor.GravityRAT.3
Bitdefender Antivirus (Linux) Gen:Variant.Tedy.816526
Kaspersky Standard (Windows) HEUR:Trojan.Win32.Vimditator.gen
Emsisoft Commandline Scanner (Windows) Gen:Variant.Tedy.816526 (B)
File has been identified by 51 AntiVirus engines on VirusTotal as malicious (50 out of 51 events)
Bkav W64.AIDetectMalware
tehtris Generic.Malware
Cynet Malicious (score: 100)
CAT-QuickHeal Trojan.GravityRAT.S35101943
ALYac Gen:Variant.Tedy.816526
Cylance Unsafe
VIPRE Gen:Variant.Tedy.816526
CrowdStrike win/malicious_confidence_90% (D)
BitDefender Gen:Variant.Tedy.816526
K7GW Trojan ( 005539191 )
K7AntiVirus Trojan ( 005539191 )
Arcabit Trojan.Tedy.DC758E
VirIT Trojan.Win64.Agent.IDP
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/Agent.PR
APEX Malicious
Avast Win32:MalwareX-gen [Misc]
ClamAV Win.Trojan.GravityRAT-6511862-0
Kaspersky HEUR:Trojan.Win32.Vimditator.gen
NANO-Antivirus Trojan.Win32.Backdoor.kxjzmv
MicroWorld-eScan Gen:Variant.Tedy.816526
Rising Backdoor.GravityRAT!1.BE3F (CLASSIC)
Emsisoft Gen:Variant.Tedy.816526 (B)
F-Secure Trojan.TR/Spy.Gen
DrWeb BackDoor.GravityRAT.3
Zillya Trojan.Agent.Win64.3706
McAfeeD ti!6252E9F1ADDF
CTX exe.unknown.tedy
Sophos Troj/Agent-BLKX
SentinelOne Static AI - Malicious PE
Jiangmin Trojan.Agent.ceqd
Google Detected
Avira TR/Spy.Gen
Gridinsoft Ransom.Win64.Bladabindi.oa!s1
Microsoft Trojan:Win64/GravityRat!rfn
ZoneAlarm Troj/Agent-BLKX
GData Gen:Variant.Tedy.816526
Varist W64/Trojan3.ASJX
AhnLab-V3 Malware/Win64.RL_Generic.R305727
VBA32 Backdoor.GravityRAT
DeepInstinct MALICIOUS
Malwarebytes Generic.Malware.Gen.DDS
Ikarus Trojan.Win64.Agent
Panda Trj/CI.A
Tencent Trojan-DL.Win64.Agent.hd
Yandex Trojan.Vimditator!/ObcJ2pldiQ
huorong Trojan/Agent.ayn
MaxSecure Trojan.Malware.121218.susgen
Fortinet W64/Gasket.BJQV!tr
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.