Summary | ZeroBOX

vbc.exe

Generic Malware UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 5, 2021, 2:06 p.m. Oct. 5, 2021, 2:08 p.m.
Size 136.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 013d4cb9c83ba31bfb0c9041f565acbb
SHA256 4387b1c679623e8f2430732c0ff94e3ad733b23d7ca6f5be7f7d79beadd40a68
CRC32 F98BB066
ssdeep 1536:HVAy0bKPleQig7OvPBuvJ7pdDlkM6ElpA5rRpaIaR6Lid5vX3WzkmGUkm:HoK0I7j7zDaUlO2RUid5vyG5m
Yara
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

resource name RC_DATA
Bkav W32.AIDetect.malware1
Lionic Trojan.Win32.Malicious.4!c
Elastic malicious (high confidence)
McAfee RDN/Generic.dx
Sangfor Trojan.Win32.Save.a
Cybereason malicious.c56b23
Symantec Trojan.Gen.9
ESET-NOD32 a variant of Win32/Injector_AGen.X
APEX Malicious
Paloalto generic.ml
Kaspersky UDS:Worm.Multi.GenericML.xnet
Avast FileRepMalware
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.ch
FireEye Generic.mg.013d4cb9c83ba31b
Sophos Mal/Generic-S
Ikarus Win32.Outbreak
Webroot W32.Malware.Gen
Kingsoft Win32.Troj.Generic_a.a.(kcloud)
Microsoft Trojan:Script/Phonzy.B!ml
MAX malware (ai score=99)
Yandex Trojan.AvsArher.bTx33N
SentinelOne Static AI - Malicious PE
eGambit Unsafe.AI_Score_99%
BitDefenderTheta Gen:NN.ZevbaF.34170.im0@ainsXbdi
AVG FileRepMalware
CrowdStrike win/malicious_confidence_70% (W)