SHA256: 6c99dd395a98d20237d05527e84ef8d0d2f9f2a599494ee0632c7bfab2399e33 File name: wire145.exe Detection ratio: 37 / 61 Analysis date: 2017-05-15 02:54:56 UTC ( 0 minutes ago ) Kaspersky Backdoor.Win32.Androm.ngwk 20170515 McAfee Artemis!F65BE5A2E77C 20170515 McAfee-GW-Edition BehavesLike.Win32.Virus.th 20170514 eScan Trojan.GenericKD.5065116 20170515 NANO-Antivirus Trojan.Win32.Androm.eotpjr 20170514 Palo Alto Networks (Known Signatures) generic.ml 20170515 Panda Trj/GdSda.A 20170514 Qihoo-360 Trojan.Generic 20170515 Rising Malware.Generic.3!tfe (cloud:DiQytucAL2U) 20170515 Sophos Mal/Generic-S 20170514 Symantec Infostealer.Lokibot 20170514 Tencent Win32.Trojan.Inject.Auto 20170515 TrendMicro-HouseCall Suspicious_GEN.F47V0513 20170515 VIPRE Trojan.Win32.Generic!BT 20170515 Webroot W32.Trojan.Gen 20170515 ZoneAlarm by Check Point Backdoor.Win32.Androm.ngwk 20170514 2017-05-14 21:26:44.615814 IP 192.168.1.102.58035 > 176.62.8.9.80: Flags [P.], seq 0:394, ack 1, win 256, length 394: HTTP: GET /wire145.exe HTTP/1.1 E…Z.@…$ …f.>.     …P…\i.0UP….c..GET /wire145.exe […]