Summary | ZeroBOX

SetGamma.exe

GCC MinGW
Category Machine Started Completed
FILE s1_win7_x6401 April 27, 2021, 10:25 a.m. April 27, 2021, 10:25 a.m.
Size 102.7KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 20f182a5632ec5a6681a0b4dad61404f
SHA256 e604e09e93c5358b2fffae0d00f3b6c3ce4753b1b7729958e72fdf34783c3b04
CRC32 1286E2D0
ssdeep 1536:8s5iTCx5cbYdyBCOgu3yUyJCb+ESbz7DebM:8Vmx5cGyBo5/Lz
Yara
  • MinGW - Used MinGW (Win GCC)
  • IsPE32 - (no description)
  • IsConsole - (no description)
  • HasOverlay - Overlay Check
  • MinGW_1 - (no description)
  • PE_Header_Zero - PE File Signature Zero
  • screenshot - Take screenshot

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

FireEye Generic.mg.20f182a5632ec5a6
McAfee Artemis!20F182A5632E
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
Cybereason malicious.5632ec
Cyren W32/Ursu.CT.gen!Eldorado
Symantec ML.Attribute.HighConfidence
APEX Malicious
AegisLab Trojan.Win32.Ursu.4!c
Sophos ML/PE-A
VIPRE Trojan.Win32.Generic!BT
McAfee-GW-Edition BehavesLike.Win32.Generic.cm
Ikarus Trojan.Crypt
Jiangmin Exploit.Agent.fn
Microsoft Trojan:Win32/Wacatac.B!ml
Rising Malware.Heuristic!ET#94% (RDMK:cmRtazqElPDRxr741M2J2f0Xp5m+)
Fortinet W32/Ursu.558C!tr
Panda Trj/GdSda.A
Qihoo-360 Win32/Trojan.Generic.HgIASOoA