Summary | ZeroBOX

ytaa1115.exe

Gen1 Malicious Library UPX Malicious Packer PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 4, 2022, 5:53 p.m. Nov. 4, 2022, 6 p.m.
Size 447.0KB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 8b88b2436809e4e15539e77c90a49762
SHA256 72a38b7b1c14bb89928a4fcac764d081d0b9df697d101045140aa81be828a385
CRC32 97F2AFDD
ssdeep 6144:C8aMyDtA0r3XIMxEZ/mRfhTOWm5t5kktgRGerEhgVIXFML:C5lIuEZ/miN5Z5erLIX
PDB Path StikyNot.pdb
Yara
  • Win32_Trojan_Gen_2_0904B0_Zero - Win32 Trojan Gen
  • Malicious_Library_Zero - Malicious_Library
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • Malicious_Packer_Zero - Malicious Packer
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path StikyNot.pdb
resource name IMAGE
resource name MUI
resource name UIFILE
resource name WEVT_TEMPLATE
ESET-NOD32 a variant of Win64/TrojanDownloader.Agent.LI
ClamAV Win.Downloader.Upatre-9880459-0
Microsoft Trojan:Win32/Wacatac.H!ml
Google Detected
Ikarus Trojan-Downloader.Win64.Agent