查看: 1803|回复: 15
收起左侧

[病毒样本] #DirectSyscall

[复制链接]
UNknownOoo
发表于 2022-7-14 16:57:18 | 显示全部楼层 |阅读模式
智量扫描miss,双击WIBD:HEUR.DirectSyscall.B
VT发帖时10检出

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
诸葛亮
发表于 2022-7-14 17:22:40 | 显示全部楼层
Filename: 7c519f4b8c79aeebf44cc9c9c2b5c4e1ab5ee279616578c79b08c273a2ba4706.exe
Threat name: Trojan.Gen.MBTFull Path: C:\Users\山一程\Desktop\7c519f4b8c79aeebf44cc9c9c2b5c4e1ab5ee279616578c79b08c273a2ba4706\7c519f4b8c79aeebf44cc9c9c2b5c4e1ab5ee279616578c79b08c273a2ba4706.exe

____________________________

____________________________


On computers as of 
2022/7/14 at 17:22:29

Last Used 
2022/7/14 at 17:22:29

Startup Item 
No

Launched 
No

Threat type: Virus. Programs that infect other programs, files, or areas of a computer by inserting themselves or attaching themselves to that medium.


____________________________


7c519f4b8c79aeebf44cc9c9c2b5c4e1ab5ee279616578c79b08c273a2ba4706.exe Threat name: Trojan.Gen.MBT
Locate


Very Few Users
Fewer than 5 users in the Norton Community have used this file.

Very New
This file was released less than 1 week  ago.

High
This file risk is high.


____________________________


Source: External Media


____________________________

File Actions

File: C:\Users\山一程\Desktop\7c519f4b8c79aeebf44cc9c9c2b5c4e1ab5ee279616578c79b08c273a2ba4706\ 7c519f4b8c79aeebf44cc9c9c2b5c4e1ab5ee279616578c79b08c273a2ba4706.exe Blocked
____________________________


File Thumbprint - SHA:
Not available
File Thumbprint - MD5:
Not available
huangzihang
发表于 2022-7-14 17:44:55 | 显示全部楼层
Gen:Suspicious.Cloud.2.5OW@amre52j
anthonyqian
发表于 2022-7-14 18:16:03 | 显示全部楼层
ESET

Win64/Agent_AGen.GR
aboringman
发表于 2022-7-14 20:44:51 | 显示全部楼层
360: 0



  1. 时间 操作 说明 次数
  2. 2022-07-05 22:51:49 [已阻止]   远程线程注入 防护 1 次
  3. 详细描述:
  4. 进程:C:\USERS\123\DESKTOP\7C519F4B8C79AEEBF44CC9C9C2B5C4E1AB5EE279616578C79B08C273A2BA4706.EXE
  5. 动作:远程线程注入
  6. 路径:C:\Windows\System32\notepad.exe
  7. 风险文件:C:\USERS\123\DESKTOP\7C519F4B8C79AEEBF44CC9C9C2B5C4E1AB5EE279616578C79B08C273A2BA4706.EXE
  8. 防护信息: AD|2, 88|30, 30, -1||
复制代码

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
pal家族
发表于 2022-7-14 20:56:18 | 显示全部楼层
卡巴双击
过两分钟主防报毒:
Event: Malicious object detected
Application: 7c519f4b8c79aeebf44cc9c9c2b5c4e1ab5ee279616578c79b08c273a2ba4706.exe
User: GP76\Xzz123
User type: Active user
Component: System Watcher
Result description: Detected
Type: Trojan
Name: PDM:Trojan.Win32.Generic
Threat level: High
Object type: Process
Object path: C:\Users\Xzz123\Desktop
Object name: 7c519f4b8c79aeebf44cc9c9c2b5c4e1ab5ee279616578c79b08c273a2ba4706.exe
Reason: Behavior analysis
Databases release date: Today, 2022/7/14 17:48:00
MD5: A433878CBE188F2FD719DBF12E26A70A

Event: Malicious object detected
Application: Kaspersky Standard
User: GP76\Xzz123
User type: Active user
Component: System Watcher
Result description: Detected
Type: Trojan
Name: MEM:Trojan.Win32.Cometer.gen
Threat level: High
Object type: File
Object name: System Memory
Reason: Expert analysis
Databases release date: Today, 2022/7/14 17:48:00
wwwab
发表于 2022-7-14 20:59:28 | 显示全部楼层
pal家族 发表于 2022-7-14 20:56
卡巴双击
过两分钟主防报毒:
Event: Malicious object detected

Ohhh,报内存了耶

而且pdm也报了,内存也报了

pal家族
发表于 2022-7-14 21:00:12 | 显示全部楼层
wwwab 发表于 2022-7-14 20:59
Ohhh,报内存了耶

而且pdm也报了,内存也报了

说实话我不知道这个cometer是啥意思
wwwab
发表于 2022-7-14 21:00:54 | 显示全部楼层
pal家族 发表于 2022-7-14 21:00
说实话我不知道这个cometer是啥意思

卡巴的内存报法报毒名称好像向来都很奇怪
纽盖特
发表于 2022-7-14 21:09:44 | 显示全部楼层
实时防护检测到威胁。文件已被隔离。C:\Users\83722\Downloads\7c519f4b8c79aeebf44cc9c9c2b5c4e1ab5ee279616578c79b08c273a2ba4706\7c519f4b8c79aeebf44cc9c9c2b5c4e1ab5ee279616578c79b08c273a2ba4706.exe 是恶意软件 Gen:Suspicious.Cloud.2.5OW@amre52j
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-7 14:24 , Processed in 0.135353 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表