Summary | ZeroBOX

cc.exe

UPX Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Jan. 26, 2023, 10:45 a.m. Jan. 26, 2023, 11:03 a.m.
Size 368.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7c684ac9c2b1d2018031e342f6be13f7
SHA256 0d46610e2e3f011803d0ade200588b97b43bd9d5a2547eadba17a75be276196f
CRC32 5AF4C054
ssdeep 6144:AEyLcI+BMY4Q/ZdGpChCWQoQI0+MOKXLdUT:Tyf+CY48Z0pCwWpjWfdUT
PDB Path C:\fotowufe kivajimevajin\polovamapud_bepel\zutujen_budide.pdb
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\fotowufe kivajimevajin\polovamapud_bepel\zutujen_budide.pdb
section .yoneyep
section .xigul
section .vafa
resource name AFX_DIALOG_LAYOUT
section {u'size_of_data': u'0x00022000', u'virtual_address': u'0x00013000', u'entropy': 7.808829104795083, u'name': u'.data', u'virtual_size': u'0x00037b20'} entropy 7.8088291048 description A section with a high entropy has been found
entropy 0.370068027211 description Overall entropy of this PE file is high
Bkav W32.AIDetectNet.01
Elastic malicious (high confidence)
FireEye Generic.mg.7c684ac9c2b1d201
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
Cybereason malicious.cc40ed
Symantec ML.Attribute.HighConfidence
Cynet Malicious (score: 100)
APEX Malicious
ClamAV Win.Packer.pkr_ce1a-9980177-0
Avast PWSX-gen [Trj]
McAfee-GW-Edition BehavesLike.Win32.Generic.fh
Trapmine malicious.high.ml.score
Sophos ML/PE-A
SentinelOne Static AI - Malicious PE
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Google Detected
Acronis suspicious
Rising Malware.Obscure!1.A3BB (CLASSIC)
Ikarus Trojan.Win32.Crypt
MaxSecure Trojan.Malware.300983.susgen
AVG PWSX-gen [Trj]