Try VMRay Platform
Malicious
Classifications

Downloader

Threat Names

Trojan.Agent.FYJF Generic.Exploit.Shellcode.RDI.2.2539BF14 Emotet Gen:Variant.Ulise.385083 +1

Remarks (2/3)

(0x02000009): DLL files normally need to be submitted with an appropriate loader. Analysis result may be incomplete if an appropriate loader was not submitted.

(0x0200000E): The overall sleep time of all monitored processes was truncated from "1 minute, 47 seconds" to "20 seconds" to reveal dormant functionality.

General

9.26 KB total sent, 139.69 KB total received
1 ports: 8080
2 contacted IP addresses
64 URLs extracted
0 files downloaded
0 malicious hosts detected

DNS

0 Bytes sent, 0 Bytes received
0 queries for 0 domains
0 name server contacted
0 queries returned errors

HTTP/S

0 Bytes sent, 0 Bytes received
0 URLs, 0 contacted servers
0 sessions detected
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image