Summary | ZeroBOX

vbc.exe

Admin Tool (Sysinternals etc ...) Malicious Library UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6402 Oct. 14, 2021, 3:17 p.m. Oct. 14, 2021, 3:19 p.m.
Size 991.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2292debf2685fda1410be586bd7d25b1
SHA256 90e1eac40edda005fffadbb1d16c652d16e685f8f4cf7375eb6ac928222c3a1c
CRC32 51AC6A90
ssdeep 12288:GrHeuodar6Dd3m4aS9FCZXhGiX1d0uVrLGaDOdJ4NUTI94rv4lprmi:GDe0W1m4aVNTc9jOiI2rqpm
Yara
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section CODE
section DATA
section BSS
packer BobSoft Mini Delphi -> BoB / BobSoft
Elastic malicious (high confidence)
McAfee Artemis!2292DEBF2685
Cylance Unsafe
APEX Malicious
Paloalto generic.ml
Kaspersky UDS:DangerousObject.Multi.Generic
McAfee-GW-Edition BehavesLike.Win32.Worm.dh
Kingsoft Win32.Troj.Generic_a.a.(kcloud)
Microsoft Trojan:Win32/Sabsik.FL.B!ml
ZoneAlarm UDS:DangerousObject.Multi.Generic
BitDefenderTheta Gen:NN.ZelphiCO.34214.9GW@aGR2mjei
VBA32 BScope.TrojanSpy.Noon
Malwarebytes Trojan.MalPack.SMY.Generic
Rising Trojan.Generic@ML.100 (RDML:/qRZtUoiYH58wFqRX2Kpiw)
Ikarus Trojan.Win32.Spy
Fortinet W32/Injector.EQAC!tr