Summary | ZeroBOX

mad.zip

Category Machine Started Completed
FILE s1_win7_x6401 July 14, 2021, 7:42 a.m. July 14, 2021, 7:44 a.m.
Size 365.3KB
Type Zip archive data, at least v2.0 to extract
MD5 2dd394b649d386e88e6d6da28be926d5
SHA256 5f7eb7cc3478aea3ae9f539e8d1a86aa36e188f468f8dc0ddd596571ac82008e
CRC32 3A016191
ssdeep 6144:nswHvUg96JxHRqyjyFXs7flb4rf+ZFkDyAL2GQs7wiVHjj5LE2bUBH74L/3c:jF6JxH4jFclCmjmyZrFOjj62Ksjc
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Elastic malicious (high confidence)
FireEye Trojan.GenericKD.37227987
McAfee Artemis!5AB6825CFCED
Sangfor Infostealer.MSIL.Racealer.gen
ESET-NOD32 Win32/Spy.Raccoon.A
Avast Win32:PWSX-gen [Trj]
Kaspersky UDS:Trojan-PSW.MSIL.Racealer.gen
BitDefender Trojan.GenericKD.37227987
Sophos Mal/Generic-S
McAfee-GW-Edition Artemis!Trojan
SentinelOne Static AI - Suspicious Archive
Microsoft Trojan:Win32/AgentTesla!ml
GData Win32.Trojan-Stealer.Raccoon.LG7OQB
MAX malware (ai score=82)
Malwarebytes MachineLearning/Anomalous.100%
Ikarus Trojan-Spy.Win32.Raccoon
MaxSecure Trojan.Malware.300983.susgen
Fortinet PossibleThreat
AVG Win32:PWSX-gen [Trj]