Summary | ZeroBOX

PAYMENT.exe

PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Sept. 8, 2021, 9:29 a.m. Sept. 8, 2021, 9:31 a.m.
Size 6.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 d16088a5dce52983fccd16363d805cf7
SHA256 bbe5f86a8063e4604f53e8c73e2303a83d50a27b58d4cade475ac8a99d1ff80d
CRC32 0BAF72CD
ssdeep 96:l/v0pXbZZ8gnCsvb209jNJPD9FWVEFrjhx:l+LbJnjjNBDiV
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
img.neko.airforce 167.172.239.151
IP Address Status Action
164.124.101.2 Active Moloch
167.172.239.151 Active Moloch

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2368
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00193000
process_handle: 0xffffffff
1 0 0
Elastic malicious (high confidence)
FireEye Generic.mg.d16088a5dce52983
Cylance Unsafe
Sangfor Suspicious.Win32.Save.a
Cybereason malicious.8f9c55
ESET-NOD32 a variant of Win32/TrojanDownloader.Agent.FVU
APEX Malicious
Paloalto generic.ml
Kaspersky UDS:Trojan.Win64.Injects
Avast Win32:MalwareX-gen [Trj]
Rising Trojan.Generic@ML.90 (RDML:QitSBVLx5WW+JL7snoY5eA)
VIPRE Lookslike.Win32.Sirefef.c!ag (v)
SentinelOne Static AI - Malicious PE
Microsoft Trojan:Win32/Woreflint.A!cl
BitDefenderTheta Gen:NN.ZexaF.34126.auW@aOt23Bhi
MaxSecure Trojan.Malware.300983.susgen
AVG Win32:MalwareX-gen [Trj]
CrowdStrike win/malicious_confidence_70% (D)