Summary | ZeroBOX

Schykoxq.dat

Category Machine Started Completed
FILE s1_win7_x6403_us Dec. 21, 2022, 9:59 a.m. Dec. 21, 2022, 10:17 a.m.
Size 894.4KB
Type gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT)
MD5 706fa87c0f1209e1ec3db4d5166fc13b
SHA256 83b5b9a928cd6f36ee2fdcb307c80c1fb24d9adee74dd2c2c9e6282441c71aa8
CRC32 4A0005C9
ssdeep 24576:NCPHJjJmZu/oPeZTwsyEf82qvyi75fNNMjy4N:UHJNi/eZTwsyIUV5N94N
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Lionic Trojan.ZIP.Exnet.4!c
Elastic malicious (high confidence)
FireEye Gen:Variant.MSILHeracles.56233
Arcabit Trojan.MSILHeracles.DDBA9
Cyren W32/MSIL_Kryptik.IOG.gen!Eldorado
Symantec Trojan.Gen.NPE
ESET-NOD32 a variant of MSIL/Kryptik.AGPE
Kaspersky VHO:Trojan.MSIL.Exnet.gen
BitDefender Gen:Variant.MSILHeracles.56233
Cynet Malicious (score: 99)
Emsisoft Gen:Variant.MSILHeracles.56233 (B)
VIPRE Gen:Variant.MSILHeracles.56233
Sophos Mal/Generic-S
Avira HEUR/AGEN.1237103
MAX malware (ai score=80)
Microsoft Program:Win32/Wacapew.C!ml
GData Gen:Variant.MSILHeracles.56233
Google Detected
AhnLab-V3 Trojan/Win.PX.C5285661
McAfee Artemis!96EA7FE24F90
Rising Malware.Obfus/MSIL@AI.100 (RDM.MSIL2:Kf4HJTA8BfVYS8qFajnriw)
Fortinet MSIL/Kryptik.AGJS!tr