Summary | ZeroBOX

jgfz.jpg

PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6402 June 17, 2021, 1:17 p.m. June 17, 2021, 1:19 p.m.
Size 18.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 51c10802ed8cbcb4850a602c43b691ec
SHA256 6a89deb3aa29bae199ce09551378986120b2806f15e7e09c9742676046556d79
CRC32 C9592B64
ssdeep 192:2kisNgpAXgPu9JAxjwCMrpY7e8LqPZo5LdCfq1Rn6O3Qv3ztVYs85naRPcyJmbOj:28PJAxjr6+e9Pfqbn1QvJVYqeOj
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
172.217.25.14 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section .aspack
section .adata
packer ASPack v2.12 -> Alexey Solodovnikov
name RT_ICON language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00008460 size 0x000025a8
name RT_GROUP_ICON language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0000844c size 0x00000014
name RT_VERSION language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00008218 size 0x00000234
name RT_MANIFEST language LANG_CHINESE filetype XML 1.0 document, ASCII text, with very long lines, with no line terminators sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00008048 size 0x000001cd
host 172.217.25.14
regkey HKEY_CURRENT_USER\Software\FlySky\E\Install
Cynet Malicious (score: 100)
Malwarebytes Malware.AI.2494098217
Cybereason malicious.db600b
Cyren W32/Trojan.VZXV-0476
Paloalto generic.ml
NANO-Antivirus Trojan.Win32.Drop.dlhwif
McAfee-GW-Edition BehavesLike.Win32.Kudj.lm
FireEye Generic.mg.51c10802ed8cbcb4
Sophos Generic ML PUA (PUA)
APEX Malicious
Jiangmin RiskTool.FlyStudio.awa
Antiy-AVL Trojan/Generic.ASMalwS.1B32082
Microsoft Trojan:Win32/Wacatac.B!ml
McAfee Artemis!51C10802ED8C
VBA32 Trojan.KillFiles
Cylance Unsafe
Ikarus Trojan.StartPage
Fortinet W32/FlyStudio.C!tr