Try VMRay Platform
Malicious
Classifications

Injector

Threat Names

Mal/HTMLGen-A C2/Generic-A Gen:Variant.Bulz.604474

Dynamic Analysis Report

Created on 2021-09-27T19:30:00

31a90ad6dbe61a0a90ee10802efa1a6ea8cc5edbeb3b74e79f7d07293cd56898.dll

Windows DLL (x86-32)

Remarks (2/3)

(0x02000009): DLL files normally need to be submitted with an appropriate loader. Analysis result may be incomplete if an appropriate loader was not submitted.

(0x0200000E): The overall sleep time of all monitored processes was truncated from "1 day, 17 hours, 26 minutes, 34 seconds" to "5 hours, 7 minutes, 30 seconds" to reveal dormant functionality.

(0x0200003A): A task was rescheduled ahead of time to reveal dormant functionality.

General

0.00 KB total sent
0.00 KB total received
3 ports: 465 , 443 , 993
7 contacted IP addresses
0 URLs extracted
0 files downloaded
0 malicious hosts detected

DNS

0 DNS requests for 0 domains
0 nameserver contacted
0 total requests returned errors

HTTP/S

7 URLs contacted, 7 servers
7 sessions, 0.00 KB sent, 0.00 KB received
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image