⚠️ Wichtig: VT-Erkennungsrate-Logik
Eine niedrige Erkennungsrate bedeutet gefährlich — die Malware ist evasiv und umgeht die meisten Antivirenprogramme.
<10% erkannt = kaum erkannt = maximal evasiv
10–30% = schwach erkannt
30–60% = mäßig erkannt
≥60% = gut erkannt = breit abgedeckt
⭐ Wochen-Sample — dauerhaft getrackt (Windows-PE)
6b9364c8bc9031d537a2…
Familie: ValleyRAT
Aktiv seit: 3 Tagen — noch 4 Tage
↑
🇩🇪
DE
44
74.6%
Origin Country
🇩🇪
44
74.6%
Rang #1
24h-Aggregat (alle Runs der letzten 24 Stunden)
Letzter Run
Risiko-Verteilung 24h-Aggregat
Top Dateitypen
Kategorien
Familien-Trend
Top Malware-Familien
| # | Familie | Anz. | Anteil |
|---|---|---|---|
| 1 | Mirai | 30 | 50.8% |
| 2 | unbekannt | 25 | 42.4% |
| 3 | HTML | 1 | 1.7% |
| 4 | Linux | 1 | 1.7% |
| 5 | Mint | 1 | 1.7% |
| 6 | ValleyRAT | 1 | 1.7% |
Betroffene Plattformen
🐧 Linux
44
74.6%
🪟 Windows
8
13.6%
❓ Unbekannt
7
11.9%
Top 10 nach Risiko-Score
VT-Rate: ROT = kaum erkannt = evasiv = gefährlich
| SHA256 | Familie | Kategorie | Score | Level | VT-Rate ⚠️ | Erkennungsqualität | 🛡️Defender |
|---|---|---|---|---|---|---|---|
| 907cd5033f777a… | Mirai | Botnet/IoT | 83.3 | 🔴 KRITISCH | – | – | ? |
| a1bb4a095c8ef4… | Mirai | Botnet/IoT | 83.3 | 🔴 KRITISCH | – | – | ? |
| 31e6bef3cc130b… | Mirai | Botnet/IoT | 83.3 | 🔴 KRITISCH | – | – | ? |
| e01a2e8a9282e1… | Mirai | Botnet/IoT | 83.2 | 🔴 KRITISCH | – | – | ? |
| 32fb8ed33c0fdb… | Mirai | Botnet/IoT | 83.0 | 🔴 KRITISCH | – | – | ? |
| a259b93bd6b62e… | Mirai | Botnet/IoT | 82.9 | 🔴 KRITISCH | – | – | ? |
| aa5ba111615f70… | Mirai | Botnet/IoT | 82.9 | 🔴 KRITISCH | – | – | ? |
| db7cac92262af6… | Mirai | Botnet/IoT | 82.9 | 🔴 KRITISCH | – | – | ? |
| 3b25164ab9d943… | Mirai | Botnet/IoT | 82.6 | 🔴 KRITISCH | – | – | ? |
| bd83fe1c9ef9ad… | Mirai | Botnet/IoT | 82.6 | 🔴 KRITISCH | – | – | ? |
MITRE ATT&CK Taktiken
Initial Access30
Lateral Movement30
Execution1
Persistence1
Initial Access[T1190](https://attack.mitre.org/techniques/T1190/)
Lateral Movement[T1210](https://attack.mitre.org/techniques/T1210/)
Initial Access[T1190](https://attack.mitre.org/techniques/T1190/)
Lateral Movement[T1210](https://attack.mitre.org/techniques/T1210/)
Initial Access[T1190](https://attack.mitre.org/techniques/T1190/)
Lateral Movement[T1210](https://attack.mitre.org/techniques/T1210/)
Initial Access[T1190](https://attack.mitre.org/techniques/T1190/)
Lateral Movement[T1210](https://attack.mitre.org/techniques/T1210/)
Initial Access[T1190](https://attack.mitre.org/techniques/T1190/)
Lateral Movement[T1210](https://attack.mitre.org/techniques/T1210/)
Delta 24h vs. Vortag
Keine Änderungen erfasst.
Delta 7d-Vergleich
Keine Änderungen erfasst.
AV-Engine Zuverlässigkeit 🛡️ = Microsoft Defender (Pflicht)
FireEye
100.0%
3/3
Microsoft 🛡️
83.5%
2281/2731
ESET-NOD32
77.4%
2114/2731
Kaspersky
75.8%
2070/2730
Google
73.1%
1997/2731
Rising
69.0%
1884/2731
Ikarus
66.0%
1802/2731
Tencent
65.6%
1666/2540
Varist
65.3%
1782/2731
McAfeeD
63.1%
1722/2731
VirusTotal Ergebnisse (4 zufällig + ⭐ Wochen-Sample)
4 erkennende Engines — Klick für Details
Detected | |
| Ikarus | GT.JS.Backdoor |
| Skyhigh | BehavesLike.HTML.Exploit.cq |
| Varist | JS/Agent.DYO!Eldorado |
8 erkennende Engines — Klick für Details
Detected | |
| Kaspersky | HEUR:Trojan.Linux.Agent.se |
| McAfeeD | ti!78FCC0FB163F |
| Microsoft 🛡️ 🛡️ | Trojan:Script/Wacatac.B!ml |
| Rising | Backdoor.Mirai/Linux!1.11723 (CLOUD) |
| SentinelOne | Static AI - Suspicious ELF |
| Tencent | Linux.Trojan.Agent.Qqil |
| alibabacloud | Trojan:Linux/Wacatac.B9nj |
42 erkennende Engines — Klick für Details
| | APEX | Malicious |
| AVG | MalwareX-gen [Bot] |
| Alibaba | Worm:Win32/Phorpiex.9a5608cb |
| Arcabit | Trojan.Mint.Zard.39 |
| Avast | MalwareX-gen [Bot] |
| BitDefender 🛡️ 🛡️ | Gen:Heur.Mint.Zard.39 |
| Bkav | W32.Malware.329AD9A0 |
| CTX | exe.trojan.phorpiex |
| ClamAV | Win.Dropper.Phorpiex-10008698-0 |
| CrowdStrike | win/malicious_confidence_90% (W) |
| Cylance | Unsafe |
| Cynet | Malicious (score: 100) |
| DeepInstinct | MALICIOUS |
| ESET-NOD32 | Win32/Phorpiex_AGen.V worm |
| Elastic | malicious (high confidence) |
| Emsisoft | Gen:Heur.Mint.Zard.39 (B) |
| Fortinet | W32/Phorpiex.W!tr |
| GData | Gen:Heur.Mint.Zard.39 |
Detected | |
| Ikarus | Worm.Win32.Phorpiex |
| Kaspersky | UDS:Trojan-Dropper.Win32.Phorpiex.gen |
| Kingsoft | Win32.Trojan-Dropper.Phorpiex.gen |
| Lionic | Trojan.Win32.Phorpiex.4!c |
| McAfeeD | Trojan:Win/Phorpiex.VY |
| MicroWorld-eScan | Gen:Heur.Mint.Zard.39 |
| Microsoft 🛡️ 🛡️ | Trojan:Win32/Phorpiex.BF!MTB |
| Paloalto | generic.ml |
| Panda | Trj/GdSda.A |
| Rising | Worm.Phorpiex!1.13E48 (CLASSIC) |
| Sangfor | Worm.Win32.Phorpiex.Vmn1 |
| SentinelOne | Static AI - Malicious PE |
| Skyhigh | Trojan-JBBB!B554A3738BFA |
| Sophos | Mal/Generic-S |
| Symantec | ML.Attribute.HighConfidence |
| TrellixENS | Trojan-JBBB!B554A3738BFA |
| TrendMicro-HouseCall | Trojan.Win32.VSX.PE04CA3 |
| VBA32 | BScope.Trojan.Reconyc |
| VIPRE | Gen:Heur.Mint.Zard.39 |
| Varist | W32/S-3439e4c9!Eldorado |
| Xcitium | TrojWare.Win32.Injector.UOL@4q80ri |
| alibabacloud | Trojan:Win/Phorpiex.RK8PHU |
| huorong | Worm/Phorpiex.o |
54 erkennende Engines — Klick für Details
| | ALYac | Gen:Variant.Application.jaik.48443 |
| APEX | Malicious |
| AVG | Win32:MalwareX-gen [Misc] |
| Alibaba | Backdoor:Win32/MalwareX.f4f743d5 |
| Antiy-AVL | Trojan/Win32.Agent |
| Arcabit | Trojan.Application.jaik.DBD3B |
| Avast | Win32:MalwareX-gen [Misc] |
| Avira | TR/W32.Agent |
| Bkav | W32.Malware.D82EB47 |
| CAT-QuickHeal | Trojan.Kepavll |
| CTX | exe.trojan.generic |
| ClamAV | Win.Malware.Zegost-9879161-0 |
| CrowdStrike | win/malicious_confidence_90% (D) |
| Cylance | Unsafe |
| Cynet | Malicious (score: 100) |
| DeepInstinct | MALICIOUS |
| ESET-NOD32 | Win32/Agent.BO potentially unwanted application |
| Elastic | malicious (high confidence) |
| Emsisoft | Gen:Variant.Application.jaik.48443 (B) |
| F-Secure | Trojan.TR/W32.Agent |
| Fortinet | Riskware/Agent |
| GData | Gen:Variant.Application.jaik.48443 |
Detected | |
| Ikarus | Backdoor.Win32.Hupigon |
| Jiangmin | TrojanDropper.Daws.erg |
| K7AntiVirus | Unwanted-Program ( 005ce1951 ) |
| K7GW | Unwanted-Program ( 005ce1951 ) |
| Kaspersky | HEUR:Backdoor.Win32.Xkcp.gen |
| Kingsoft | Win32.Hack.Xkcp.gen |
| Lionic | Trojan.Win32.Xkcp.m!c |
| Malwarebytes | Stantinko.Miner.Downloader.DDS |
| MaxSecure | Trojan.Malware.324995110.susgen |
| McAfeeD | ti!6B9364C8BC90 |
| MicroWorld-eScan | Gen:Variant.Application.jaik.48443 |
| Microsoft 🛡️ 🛡️ | Trojan:Win32/Kepavll!rfn |
| Paloalto | generic.ml |
| Panda | Trj/CI.A |
| Rising | PUA.Agent!8.1B6B (CLOUD) |
| Sophos | Mal/Generic-S |
| Symantec | ML.Attribute.HighConfidence |
| Tencent | Win32.Trojan.Generic.Ckjl |
| Trapmine | malicious.moderate.ml.score |
| TrellixENS | Artemis!5905B369D1A9 |
| TrendMicro | Backdoor.Win32.VALLEYRAT.YXGELZ |
| TrendMicro-HouseCall | Backdoor.Win32.VALLEYRAT.YXGELZ |
| VBA32 | BScope.Backdoor.WOC |
| VIPRE | Gen:Variant.Application.jaik.48443 |
| Varist | W32/ABApplication.BNHC-4123 |
| alibabacloud | Trojan:Win/Wacatac.B9nj |
| | 03:47 | [f948a60ae5d4…](https://bazaar.abuse.ch/sample/f948a60ae5d42261ceaddd1fdc81eb640fcc05ec2a5b93bd63231615c545a162/) | unknown |
| | 02:47 | [effdc669bb71…](https://bazaar.abuse.ch/sample/effdc669bb714427240ba6037afd7da3da9b501b57717e1735bde3c77a22d261/) | unknown |
| | 02:25 | [907cd5033f77…](https://bazaar.abuse.ch/sample/907cd5033f777af64a32a90c35512a0829c325f7ef1f3ef6192e8de73af7ed95/) | elf |
| | 02:25 | [a1bb4a095c8e…](https://bazaar.abuse.ch/sample/a1bb4a095c8ef449b6dd79caf3fabdece150f26d09f127c4b14e768eec85f016/) | elf |
| | 02:25 | [31e6bef3cc13…](https://bazaar.abuse.ch/sample/31e6bef3cc130bcbe312ce7d8558b8ffd61decf4f2ccd55033bf957a841e13ee/) | elf |
Häufigste Tags