$ malice scan befb88b89c2eb401900a68e9f5b78764203f2b48264fcc3f7121bf04a57fd408
=OR=
docker run --rm -v /var/run/docker.sock:/var/run/docker.sock \
-v `pwd`/data/samples:/malice/samples \
-e MALICE_VT_API=$MALICE_VT_API \
malice/engine scan befb88b89c2eb401900a68e9f5b78764203f2b48264fcc3f7121bf04a57fd408
| Field |
Value |
| Name |
befb88b89c2eb401900a68e9f5b78764203f2b48264fcc3f7121bf04a57fd408 |
| Path |
data/samples/befb88b89c2eb401900a68e9f5b78764203f2b48264fcc3f7121bf04a57fd408 |
| Size |
40.96 kB |
| MD5 |
669f87f2ec48dce3a76386eec94d7e3b |
| SHA1 |
6b82f126555e7644816df5d4e4614677ee0bda5c |
| SHA256 |
befb88b89c2eb401900a68e9f5b78764203f2b48264fcc3f7121bf04a57fd408 |
| Mime |
application/x-dosexec |
| Ratio |
Link |
API |
Scanned |
| 85% |
link |
Public |
2016-02-15 11:47:03 |
- FirstSeen: 11/03/2016 9:09AM
- LastSeen: 11/08/2016 2:10AM
| Vendor |
Signature |
| QuickHeal |
TrojanAPT.LecnaCBack.MUE.Z3 |
| MicroWorld |
Backdoor.Lecna.AB |
| Fortinet |
W32/Generic.AC.1FAF5A!tr |
| Ikarus |
Backdoor.Win32.Lecna |
| Eset |
Win32/Lecna.W |
| Clam |
PUA.Win.Packer.AcprotectUltraprotect-1 |
| DrWeb |
BackDoor.Dizhi |
| Symantec |
W32.Lecna.D |
| Avast |
Win32:Lecna-I |
| McAfee |
BackDoor-CSB |
| Sophos |
Troj/Lecna-Q |
| Comodo |
Backdoor.Win32.Lecna.AB |
| AhnLab |
Win-Trojan/Lecna.61440 |
| K7GW |
Trojan ( 00013a571 ) |
| GData |
Backdoor.Lecna.AB |
| TrendMicro |
BKDR_LECNA.SM |
| Microsoft |
Backdoor:Win32/Lecna!dha |
| K7 |
Trojan ( 00013a571 ) |
| Avira |
WORM/Rbot.Gen |
| Authentium |
W32/Lecnac.A.gen!Eldorado |
| AVG |
Win32/DH{IIEXEx4XA2EICXwkIiU} |
| BitDefender |
Backdoor.Lecna.AB |
| FProt |
W32/Trojan.AAWD |
| Rule |
Description |
Offset |
Data |
Tags |
| Microsoft_Visual_Cpp_v50v60_MFC |
Microsoft Visual C++ v5.0/v6.0 (MFC) |
5204 |
U��� |
|
| Borland_Delphi_v60__v70 |
Borland Delphi v6.0 - v7.0 |
5204 |
U�� |
|
| dUP_v2x_Patcher__wwwdiablo2oo2cjbnet |
dUP v2.x Patcher --> www.diablo2oo2.cjb.net |
78 |
This program cannot be run in DOS mo |
|
| Free_Pascal_v106 |
Free Pascal v1.06 |
14866 |
���@O�k |
|
| Armadillo_v171 |
Armadillo v1.71 |
23110 |
U��j�h b@h�[@d� |
|
768:15jQ4nVHQaeO379u4XckKVCsknBN9A4hUnDxDiNZ957ZpK0IUUiM95Zdz:15jQ4nVHQaeO9uwckKuBN9A4UnDxcbFi
- 31.0% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
- 27.5% (.EXE) Win64 Executable (generic) (27638/28/4)
- 26.4% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
- 6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
- 4.4% (.EXE) Win32 Executable (generic) (4508/7/1)
| Field |
Value |
| Special Build |
|
| Code Size |
20480 |
| File Version |
6.00.2900.2180 (xpsp_sp2_rtm.040803-2158) |
| Legal Trademarks |
|
| Product Name |
Microsoft(R) Windows(R) Operating System |
| Machine Type |
Intel 386 or later, and compatibles |
| PE Type |
PE32 |
| File Version Number |
6.0.2930.2180 |
| Character Set |
Unicode |
| Comments |
|
| MIME Type |
application/octet-stream |
| Linker Version |
6.0 |
| Product Version Number |
6.0.2930.2180 |
| File Flags |
Private build |
| File OS |
Unknown (0) |
| File Description |
Internet Explorer |
| File Size |
40 kB |
| Object File Type |
Unknown |
| Legal Copyright |
(C) Microsoft Corporation. All rights reserved. |
| Original File Name |
IEXPLORE.EXE |
| Uninitialized Data Size |
0 |
| Image Version |
0.0 |
| Subsystem |
Windows GUI |
| File Flags Mask |
0x003f |
| Company Name |
Microsoft Corporation |
| Product Version |
6.00.2900.2180 |
| Initialized Data Size |
20480 |
| Entry Point |
0x5a46 |
| OS Version |
4.0 |
| File Subtype |
0 |
| Language Code |
Neutral |
| Internal Name |
iexplore |
| File Type Extension |
exe |
| File Type |
Win32 EXE |
| Subsystem Version |
4.0 |
| Private Build |
|
| ExifTool Version Number |
10.23 |
| Infected |
Result |
Engine |
Updated |
| true |
Win.Trojan.Backspace-1 |
0.99.2 |
20160919 |
| Infected |
Result |
Engine |
Updated |
| true |
Backdoor.Win32.Lecna.AB |
1.1 |
|
| Infected |
Result |
Engine |
Updated |
| true |
Backdoor.Lecna.AB |
11.00 build 79 |
20160919 |
| Infected |
Result |
Engine |
Updated |
| false |
|
4.6.5.141 |
20160919 |
| Infected |
Result |
Engine |
Updated |
| true |
Win32:Lecna-I [Trj] |
2.1.2 |
20170129 |
| Infected |
Result |
Engine |
Updated |
| true |
Found Win32/DH{YQMT?} |
13.0.3114 |
20160918 |
| Infected |
Result |
Engine |
Updated |
| true |
Backdoor.Lecna.AB |
7.90123 |
20160919 |
| Infected |
Result |
Engine |
Updated |
| true |
Troj/Lecna-Q |
5.27.0 |
20160920 |
Location: 0x402830
################################################################################################################################################################################################################################################################################################################################
Location: 0x401059
*lecnaC*
Software\Microsoft\CurrentNetInf
SYSTEM\CurrentControlSet\Control\Lsa
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
MicrosoftZj
LhbqnrnesDwhs
MicrosoftHaveExit
LhbqnrnesGud@bj`
IEXPLORE.EXE
/ver.htm
/exe.htm
/app.htm
/myapp.htm
/hostlist.htm
.aj-gsl`
/SomeUpList.htm
/SomeUpVer.htm
www.flyeagles.com
www.km-nyc.com
/restore
/dizhi.gif
/connect.gif
\$NtUninstallKB900727$
\netsvc.exe
\netscv.exe
\netsvcs.exe
System Idle Process
Program Files
\Internet Exp1orer
forceguest
AudioPort
AudioPort.sys
SYSTEM\CurrentControlSet\Services
SYSTEM\ControlSet001\Services
SYSTEM\ControlSet002\Services
\drivers\
\DriverNum.dat
Location: 0x40511A
Location: 0x404DDE
SMBs
NTLMSSP
Windows 2000 2195
Windows 2000 5.0
SMBr
PC NETWORK PROGRAM 1.0
LANMAN1.0
Windows for Workgroups 3.1a
LM1.2X002
LANMAN2.1
NT LM 0.12
Location: 0x401047
Ie_nkokbpAtep
+^]g*dpi
Ie_nkokbpD]ra=_g