Summary | ZeroBOX

rollerkind2.exe

Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 7, 2021, 6:49 p.m. Sept. 7, 2021, 6:57 p.m.
Size 609.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 69e1794d5d6331000ad3d26f6876432f
SHA256 7a887c39b8566d5bae7af7e520bc90ffc520d30fd25bf3ae4e7ea21466de5bb8
CRC32 DF9864F6
ssdeep 12288:o16B/RmIwNXQ2E8UZ9BMRbTfEeFK0xJPCz/c3xw:oGJ5T2EhGvtLLhw
PDB Path C:\zoheyafon\mereg\robo\huka.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\zoheyafon\mereg\robo\huka.pdb
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 438272
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02cde000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 835584
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x044e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x0006b600', u'virtual_address': u'0x00027000', u'entropy': 7.985204461657831, u'name': u'.data', u'virtual_size': u'0x02774388'} entropy 7.98520446166 description A section with a high entropy has been found
entropy 0.705834018077 description Overall entropy of this PE file is high
Bkav W32.AIDetect.malware2
Elastic malicious (high confidence)
FireEye Generic.mg.69e1794d5d633100
CAT-QuickHeal Ransom.Stop.Z5
McAfee Packed-GDT!69E1794D5D63
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
Cyren W32/Kryptik.EYC.gen!Eldorado
Symantec ML.Attribute.HighConfidence
APEX Malicious
McAfee-GW-Edition BehavesLike.Win32.Generic.jc
Sophos ML/PE-A
Ikarus Trojan.WinGo.Ranumbot
eGambit Unsafe.AI_Score_71%
Microsoft Trojan:Win32/Wacatac.B!ml
Cynet Malicious (score: 100)
Acronis suspicious
VBA32 BScope.Trojan.Chapak
Rising Trojan.Generic@ML.98 (RDML:Hx78nZ+JjztfOGwMH+Ya5g)
SentinelOne Static AI - Malicious PE
Cybereason malicious.1f9744