Summary | ZeroBOX

sek.exe

Malicious Library UPX OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6402 Aug. 6, 2021, 7:48 a.m. Aug. 6, 2021, 7:50 a.m.
Size 1.2MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ffd9d6d9adc6fed278781b57b8025099
SHA256 1668c886ee28fa9bd0f07972b6fc5d92b5dae54dd4625ba8c63c54e1c965ee6a
CRC32 7EEC5584
ssdeep 24576:s4lavt0LkLL9IMixoEgeatKIzYiiErB2VUTho1xWnrcVsq9MmCS:7kwkn9IMHeatKoCZUTgx2aPCS
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
888myrat.duckdns.org 78.189.177.240
IP Address Status Action
164.124.101.2 Active Moloch
78.189.177.240 Active Moloch

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.102:63203 -> 164.124.101.2:53 2022918 ET INFO DYNAMIC_DNS Query to *.duckdns. Domain Misc activity
UDP 192.168.56.102:65038 -> 164.124.101.2:53 2022918 ET INFO DYNAMIC_DNS Query to *.duckdns. Domain Misc activity

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
domain 888myrat.duckdns.org
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1068
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73cc2000
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00071800', u'virtual_address': u'0x000c4000', u'entropy': 7.9383426653705955, u'name': u'.rsrc', u'virtual_size': u'0x0007174c'} entropy 7.93834266537 description A section with a high entropy has been found
entropy 0.360890302067 description Overall entropy of this PE file is high
wmi Select * from AntiVirusProduct
dead_host 78.189.177.240:4000
Bkav W32.AIDetect.malware2
Elastic malicious (high confidence)
MicroWorld-eScan AIT:Trojan.Nymeria.2906
FireEye Generic.mg.ffd9d6d9adc6fed2
Qihoo-360 HEUR/QVM10.1.0C07.Malware.Gen
ALYac AIT:Trojan.Nymeria.2906
Cylance Unsafe
Cybereason malicious.9adc6f
Cyren W32/Agent.AFI.gen!Eldorado
Symantec Trojan.Gen.MBT
ESET-NOD32 a variant of Win32/Autoit.DB
APEX Malicious
ClamAV Txt.Malware.LodaRAT-9769386-0
Kaspersky HEUR:Backdoor.Script.LodaRat.a
BitDefender AIT:Trojan.Nymeria.2906
Avast AutoIt:KeyLogger-R [Trj]
Ad-Aware AIT:Trojan.Nymeria.2906
Sophos Mal/Generic-S
McAfee-GW-Edition BehavesLike.Win32.TrojanAitInject.tc
Emsisoft AIT:Trojan.Nymeria.2906 (B)
Avira HEUR/AGEN.1100172
MAX malware (ai score=85)
Microsoft Program:Win32/Wacapew.C!ml
GData AIT:Trojan.Nymeria.2906 (2x)
Cynet Malicious (score: 100)
McAfee Artemis!FFD9D6D9ADC6
Malwarebytes MachineLearning/Anomalous.100%
Rising Backdoor.888Rat/Autoit!1.C8E3 (CLASSIC)
Ikarus Trojan.Win32.Autoit
eGambit Unsafe.AI_Score_95%
Fortinet AutoIt/Agent.DB!tr
BitDefenderTheta AI:Packer.7492DFF116
AVG AutoIt:KeyLogger-R [Trj]
CrowdStrike win/malicious_confidence_90% (D)
MaxSecure Trojan.Malware.300983.susgen