Summary | ZeroBOX

1.dll

PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6403_us May 24, 2022, 9:16 a.m. May 24, 2022, 9:18 a.m.
Size 718.0KB
Type PE32+ executable (DLL) (console) x86-64, for MS Windows
MD5 5a0e570b13623c79c9261a8a2cc41f04
SHA256 3dfe63d2c9a7e2f848d2f92171cc577158318b4e9cb62e74ec603be84ba13109
CRC32 505C2242
ssdeep 12288:1IIX/KMsUM4ilTgZ51So74EONNuoMoOc9y21dRDXJy//zJOvcW:1IIXJgrUZfJEEONNuozxZXJWJkc
Yara
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)

Name Response Post-Analysis Lookup
ilekvoyn.com 64.227.182.2
IP Address Status Action
164.124.101.2 Active Moloch
64.227.182.2 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49179 -> 64.227.182.2:80 2032086 ET MALWARE Win32/IcedID Request Cookie A Network Trojan was detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
suspicious_features GET method with no useragent header suspicious_request GET http://ilekvoyn.com/
request GET http://ilekvoyn.com/
Elastic malicious (high confidence)
Cylance Unsafe
Sangfor Suspicious.Win32.Save.a
Cynet Malicious (score: 100)