Summary | ZeroBOX

vbc.exe

UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 22, 2021, 10:06 p.m. Sept. 22, 2021, 10:15 p.m.
Size 80.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 415ec37f083919417aefd51bdfaa3831
SHA256 d8a0961f251666689e124d09421565696a8a6710216b0a46be1e47805229e849
CRC32 60455B76
ssdeep 1536:sM+STtJlbUxcKgdESWAKw4zMj151rgeg/wD:p+STtJ2xngiSBKw4e9Ng/w
Yara
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

resource name CUSTOM
Bkav W32.AIDetect.malware2
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Razy.936011
FireEye Generic.mg.415ec37f08391941
Cylance Unsafe
BitDefender Gen:Variant.Razy.936011
Cybereason malicious.c41ea7
BitDefenderTheta Gen:NN.ZevbaCO.34142.fm0@aCH0GTmO
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/GenKryptik.FKVY
APEX Malicious
Paloalto generic.ml
Kaspersky UDS:DangerousObject.Multi.Generic
Ad-Aware Gen:Variant.Razy.936011
McAfee-GW-Edition BehavesLike.Win32.Trojan.mh
GData Gen:Variant.Razy.936011
eGambit Unsafe.AI_Score_99%
Cynet Malicious (score: 100)
MAX malware (ai score=81)
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.300983.susgen
AVG FileRepMalware