Summary | ZeroBOX

adal.jar

Category Machine Started Completed
FILE s1_win7_x6401 Oct. 29, 2021, 6:17 p.m. Oct. 29, 2021, 6:19 p.m.
Size 25.3KB
Type Java archive data (JAR)
MD5 e83ec42ad9c282b28e4561dc5fec346d
SHA256 dd80828efc70d1f89d2fadd70c4707247450723697313b582b5c6d2244f0624c
CRC32 44B4DDF0
ssdeep 384:zVyOLhkTisJzGOZw21E2zNDbFFmtjrKtl2TCRYgeEBFFckQlI3HnVW3Ud147:5w9oOZf2ON3vm5q6wBF+lsn+UfO
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 2555904
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002580000
process_handle: 0xffffffffffffffff
1 0 0
Lionic Trojan.AndroidOS.Jocker.C!c
CAT-QuickHeal Android.Jocker.GEN43293
McAfee Artemis!D703F9D11DC6
Alibaba Trojan:Android/Jocker.928220dd
K7GW Trojan ( 00570c961 )
SymantecMobileInsight AppRisk:Generisk
Symantec Trojan.Gen.NPE
ESET-NOD32 a variant of Android/Agent.CBG
Kaspersky HEUR:Trojan.AndroidOS.Jocker.fb
Tencent Dos.Trojan.Jocker.Ajlm
DrWeb Android.Joker.207.origin
McAfee-GW-Edition Artemis!Trojan
Jiangmin Trojan.AndroidOS.iooo
Avira ANDROID/Joker.IBEX.Gen
Microsoft Program:Win32/Uwamson.A!ml
Cynet Malicious (score: 99)
Ikarus Trojan-Spy.AndroidOS.Joker
MaxSecure Trojan.SMS.AndroidOS.Agent.a3
Fortinet Android/Agent.CBG!tr
count 3574 name heapspray process java.exe total_mb 893 length 262144 protection PAGE_READWRITE