Summary | ZeroBOX

vbc.exe

Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6402 Sept. 17, 2021, 9:43 a.m. Sept. 17, 2021, 9:45 a.m.
Size 181.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7789bd4d79ad897126a68bf3e74f4e1b
SHA256 40b073c5ab4b0d8bd6e03bec7553e2f4a03fed27442b4bcd01db5297f103573c
CRC32 56E4B5A0
ssdeep 3072:4AvBvFx1+GJtDUhWSH0fsYf/usOOdF+Z/j5W5Eaw2/N:4A+GJShWScnb3cc3w21
PDB Path C:\darec\yolijuf.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\darec\yolijuf.pdb
resource name HUVEHA
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2084
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 65536
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02293000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 110592
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00300000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x0001f400', u'virtual_address': u'0x00001000', u'entropy': 7.547173993577676, u'name': u'.text', u'virtual_size': u'0x0001f2c2'} entropy 7.54717399358 description A section with a high entropy has been found
entropy 0.694444444444 description Overall entropy of this PE file is high
Lionic Trojan.Multi.Generic.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.37565661
FireEye Generic.mg.7789bd4d79ad8971
McAfee GenericRXPZ-FX!7789BD4D79AD
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005822a21 )
Alibaba Backdoor:Win32/Androm.c202ddfb
K7GW Trojan ( 005822a21 )
Cybereason malicious.d7118c
Arcabit Trojan.Generic.D23D34DD
Cyren W32/Kryptik.EWJ.gen!Eldorado
Symantec Packed.Generic.525
ESET-NOD32 a variant of Win32/Kryptik.HMKO
APEX Malicious
Paloalto generic.ml
ClamAV Win.Packed.Generic-9891933-0
Kaspersky HEUR:Backdoor.Win32.Androm.gen
BitDefender Trojan.GenericKD.37565661
Avast Win32:RansomX-gen [Ransom]
Tencent Win32.Backdoor.Fareit.Auto
Ad-Aware Trojan.GenericKD.37565661
Emsisoft Trojan.Agent (A)
TrendMicro Mal_HPGen-50
McAfee-GW-Edition BehavesLike.Win32.Trojan.cc
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
Jiangmin Backdoor.Androm.bbnt
Avira TR/Crypt.Agent.mbsgo
Gridinsoft Trojan.Win32.Packed.lu!heur
Microsoft Ransom:Win32/StopCrypt.MCK!MTB
GData Trojan.GenericKD.37565661
Cynet Malicious (score: 100)
AhnLab-V3 CoinMiner/Win.Glupteba.R440970
Acronis suspicious
ALYac Trojan.GenericKD.37565661
Malwarebytes Trojan.MalPack.GS
TrendMicro-HouseCall Mal_HPGen-50
Rising Trojan.Kryptik!1.D977 (CLASSIC)
Ikarus Trojan.Win32.Crypt
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Kryptik.HMKO!tr
BitDefenderTheta Gen:NN.ZexaF.34142.lq0@aG5ZoKU
AVG Win32:RansomX-gen [Ransom]
Panda Trj/GdSda.A
CrowdStrike win/malicious_confidence_100% (W)