Summary | ZeroBOX

TAOBRAVE20-2NDSOA.cab

Category Machine Started Completed
FILE s1_win7_x6401 May 19, 2021, 1:24 p.m. May 19, 2021, 1:47 p.m.
Size 369.5KB
Type Microsoft Cabinet archive data, 378383 bytes, 1 file
MD5 76c676330782ef31d6ca09faa5e5262d
SHA256 4209b5eeee8c41e87a6776647c4629118d1c5d2809a6c112d7e925c228258f30
CRC32 5489C6AC
ssdeep 6144:iPOclJtriBEALjQu581gDvFnhVhGEGiBFJ05h4SwY7svdGW0bJoq3reAsXyoF+X:kOOJtuFL8D1gDvFhVhHX+4SwkFTJoyee
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

FireEye Gen:Variant.Bulz.477733
McAfee Artemis!1C8FF64FCAB8
Malwarebytes Malware.AI.4252127595
Sangfor Trojan.Win32.Save.a
BitDefenderTheta Gen:NN.ZemsilCO.34690.Fm0@a8a6X6o
ESET-NOD32 a variant of MSIL/Kryptik.AAYK
TrendMicro-HouseCall TROJ_GEN.R06CC0WEI21
Avast Win32:RATX-gen [Trj]
Kaspersky HEUR:Trojan-Downloader.MSIL.Seraph.gen
BitDefender Gen:Variant.Bulz.477733
AegisLab Trojan.MSIL.Seraph.a!c
TrendMicro TROJ_GEN.R06CC0WEI21
McAfee-GW-Edition BehavesLike.Generic.fc
Sophos Mal/DrodCab-A
SentinelOne Static AI - Malicious Archive
Microsoft Trojan:Win32/Woreflint.A!cl
GData Gen:Variant.Bulz.477733
MAX malware (ai score=80)
Rising Downloader.Seraph!8.111C6 (CLOUD)
Fortinet MSIL/Kryptik.AAYK!tr
AVG Win32:RATX-gen [Trj]
Panda Trj/GdSda.A