text
stringlengths 4
429
|
---|
pdf-
|
interest.html
|
https://www.virustotal.com/file/daac83fc4af5c53068c4e5a29dadfdc5200e3b3fc2b491eebe0a4bc19ec9e3f2/analysis/1285731514/
|
https://www.virustotal.com/file/ecefcd2f2b862e987ea4b6b7d475c924d9662ad955096872a2c5b822901c63b3/analysis/
|
http://www.sophos.com/en-
|
us/threat-
|
center/threat-
|
analyses/viruses-
|
and-
|
spyware/Mal~Ovoxual-
|
A/detailed-
|
analysis.aspx
|
http://anubis.iseclab.org/?action=result&task_id=14495366b24a64d242d1946aa1e3a88be&format=html
|
2012
|
Zscaler
|
Inc.
|
Seculert
|
Ltd.
|
Rights
|
Reserved.
|
Sophos
|
uniquely
|
detects13
|
Mal/
|
Ovoxual-
|
(added
|
07/19/2010)14
|
Sandbox
|
reports
|
this
|
sample
|
generally
|
fail15
|
showing
|
following
|
dialog
|
box:
|
Figure
|
ThreatExpert
|
Malware
|
Failure
|
Dialog
|
System
|
runtime
|
analysis
|
showed
|
initial
|
malformed
|
Google
|
query:
|
www.google.com/search?qu=
|
Figure
|
Malformed
|
Google
|
PCAP
|
During
|
Run-
|
Time
|
Analysis
|
Followed
|
failed
|
connection
|
attempts
|
140.112.19.195
|
(National
|
Taiwan
|
University)
|
further
|
detailed
|
static
|
analysis
|
this
|
msupdate.exe
|
FAVORITES.DAT
|
sample
|
completed
|
CyberESI16.
|
their
|
report
|
they
|
discuss
|
that
|
setup.exe
|
dropper
|
virtual
|
machine
|
(VM)
|
aware
|
using
|
SIDT
|
instruction17
|
detected,
|
msupdate.exe
|
Trojan
|
dropped.
|
msupdate.exe
|
Trojan
|
aware
|
using
|
same
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.