SHA256: 41483ee139d27f4d5e7d85c4d6bc461e4d698f0e3bb6d44b7da58d191fd1916c File name: Dcx4HVf_If.exe?download=Super.exe Detection ratio: 40 / 55 Analysis date: 2017-01-21 23:26:42 UTC ( 0 minutes ago ) Kaspersky Trojan.Win32.Autoit.abfdb 20170121 Malwarebytes Trojan.Dropper.SFX 20170121 McAfee Generic.grp 20170121 McAfee-GW-Edition Generic.grp 20170121 eScan Trojan.GenericKD.4193802 20170121 Microsoft Backdoor:Win32/NetWiredRC!rfn 20170121 Panda Trj/CI.A 20170121 Qihoo-360 HEUR/QVM06.2.97AB.Malware.Gen 20170122 Rising Malware.Undefined!8.C-GCgyogYtbVV (cloud) 20170121 Sophos Troj/Agent-AVAI 20170121 Symantec ML.Relationship.HighConfidence [Infostealer.Limitail] 20170121 Tencent Win32.Backdoor.Netwire.7675 20170122 TrendMicro TROJ_FRS.0NA000AJ17 20170121 TrendMicro-HouseCall TROJ_FRS.0NA000AJ17 20170122 VIPRE Trojan.Win32.Generic!BT 20170122 2017-01-21 01:32:54.086537 IP 192.168.1.102.50629 > 192.0.77.17.80: Flags [P.], seq 0:305, ack 1, win 256, length 305: HTTP: GET /Dcx4HVf_If.exe?download=Super.exe HTTP/1.1 E..Yh-@….Q…f..M….P…o..*.P…….GET /Dcx4HVf_If.exe?download=Super.exe HTTP/1.1 Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */* Accept-Language: en-us User-Agent: Mozilla/4.0 […]