Summary | ZeroBOX

vbc.exe

UPX Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 21, 2021, 9:02 a.m. Oct. 21, 2021, 9:04 a.m.
Size 308.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7e03d277e60e3ab52416937b82a9f23d
SHA256 225094389cc0b17be12db3ac35a84f89e63f1563c999ca25d36980624571d529
CRC32 5BBBC96A
ssdeep 6144:kj+/qEil3jrW8/0y/k01lP2zpfQpBI4Flbet6:kEqzsy/k01lP21QpBI0
PDB Path C:\rarixal\sobu.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\rarixal\sobu.pdb
resource name XASOBEZEHAMUHEYENEXUT
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 65536
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e6c000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1896
region_size: 110592
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00035e00', u'virtual_address': u'0x00001000', u'entropy': 6.975898220127731, u'name': u'.text', u'virtual_size': u'0x00035c56'} entropy 6.97589822013 description A section with a high entropy has been found
entropy 0.701954397394 description Overall entropy of this PE file is high
Bkav W32.AIDetect.malware2
Lionic Trojan.Win32.Androm.m!c
Elastic malicious (high confidence)
DrWeb Trojan.Siggen15.28201
MicroWorld-eScan Trojan.GenericKD.47218356
FireEye Generic.mg.7e03d277e60e3ab5
CAT-QuickHeal Ransom.Stop.Z5
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
K7AntiVirus Riskware ( 00584baa1 )
K7GW Riskware ( 00584baa1 )
Cybereason malicious.6f6ee5
Arcabit Trojan.Generic.D2D07EB4
Cyren W32/Kryptik.FNY.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HMZM
APEX Malicious
Paloalto generic.ml
Kaspersky UDS:Backdoor.Win32.Androm
BitDefender Trojan.GenericKD.47218356
Avast Win32:BotX-gen [Trj]
Ad-Aware Trojan.GenericKD.47218356
Emsisoft Trojan.GenericKD.47218356 (B)
Baidu Win32.Trojan.Kryptik.jm
McAfee-GW-Edition BehavesLike.Win32.Emotet.fm
Sophos Mal/Generic-R + Troj/Krypt-DI
Ikarus Trojan.Win32
eGambit Unsafe.AI_Score_96%
Avira TR/AD.GenSHCode.elglt
Gridinsoft Ransom.Win32.AzorUlt.sa
Microsoft Trojan:Win32/Azorult.RT!MTB
GData Win32.Trojan.BSE.WS9D4D
Cynet Malicious (score: 100)
Acronis suspicious
McAfee Packed-GDV!7E03D277E60E
MAX malware (ai score=83)
VBA32 BScope.Backdoor.Agent
Malwarebytes Trojan.MalPack.GS
TrendMicro-HouseCall TROJ_GEN.R002C0DJK21
Rising Trojan.Kryptik!1.D9FE (CLASSIC)
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Packed.GDV!tr
Webroot W32.Trojan.Gen
AVG Win32:BotX-gen [Trj]
Panda Trj/GdSda.A
CrowdStrike win/malicious_confidence_100% (W)