Summary | ZeroBOX

vbc.exe

Gen1 Malicious Library UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 March 17, 2023, 9:38 a.m. March 17, 2023, 9:49 a.m.
Size 1.9MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 b12fe6628b45145916f3d8c86238078c
SHA256 090fdf318c2c642e77918b3c4bc5a0bf9ef62123bb5fb5091d633bd84156efdb
CRC32 9F8CCFC4
ssdeep 49152:pey5hyBIZak9lkSRxUI1lH+Is9V8X5A0mSBNLPhbusJ6Cb:kyOIR9lDxBfwg51Nr7h686g
PDB Path C:\Bile mew\vawo jevev\Xefaniya\Kah\quohipof.pdb
Yara
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • Win32_Trojan_Gen_2_0904B0_Zero - Win32 Trojan Gen
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
5rrgmeftoclglat5t7mmd9a.62wtco97ne9fk1j06ldaz
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\Bile mew\vawo jevev\Xefaniya\Kah\quohipof.pdb
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_ICON language LANG_SERBIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b860 size 0x00000128
name RT_GROUP_ICON language LANG_SERBIAN filetype data sublanguage SUBLANG_SERBIAN_CYRILLIC offset 0x0047b988 size 0x000000ca
section {u'size_of_data': u'0x001b1a00', u'virtual_address': u'0x00001000', u'entropy': 7.96105948698657, u'name': u'.text', u'virtual_size': u'0x001b1833'} entropy 7.96105948699 description A section with a high entropy has been found
section {u'size_of_data': u'0x00032c00', u'virtual_address': u'0x00449000', u'entropy': 7.67083445837491, u'name': u'.rsrc', u'virtual_size': u'0x00032a58'} entropy 7.67083445837 description A section with a high entropy has been found
entropy 0.981261078754 description Overall entropy of this PE file is high
Bkav W32.AIDetectNet.01
Lionic Trojan.Win32.Strab.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.65921610
FireEye Generic.mg.b12fe6628b451459
McAfee Artemis!B12FE6628B45
Malwarebytes Trojan.Downloader
VIPRE Trojan.GenericKD.65921610
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
Alibaba TrojanDownloader:Win32/Strab.d37dbc21
Arcabit Trojan.Generic.D3EDE24A
BitDefenderTheta Gen:NN.ZexaF.36344.7vX@aOE5XcbG
Cyren W32/ABRisk.UQLX-4129
Symantec Trojan Horse
ESET-NOD32 a variant of Win32/TrojanDownloader.Agent.GPV
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Strab.gen
BitDefender Trojan.GenericKD.65921610
Avast Win32:DropperX-gen [Drp]
Tencent Win32.Trojan-Downloader.Oader.Tzfl
TrendMicro TrojanSpy.Win32.RHADAMANTHYS.YXDCNZ
McAfee-GW-Edition Artemis!Trojan
Emsisoft Trojan.GenericKD.65921610 (B)
Webroot W32.Trojan.Gen
Avira TR/Dldr.Agent.eakhl
MAX malware (ai score=88)
Antiy-AVL Trojan/Win32.Sabsik
Gridinsoft Ransom.Win32.Sabsik.sa
Microsoft Trojan:Win32/Casdet!rfn
ViRobot Trojan.Win.Z.Stealer.2028120
GData Trojan.GenericKD.65921610
Google Detected
AhnLab-V3 Trojan/Win.Generic.R562533
VBA32 BScope.TrojanSpy.Stealer
ALYac Backdoor.Remcos.A
Cylance unsafe
TrendMicro-HouseCall TrojanSpy.Win32.RHADAMANTHYS.YXDCNZ
Rising Backdoor.Agent!8.C5D (TFE:5:Tpf88tZVTGP)
Ikarus Trojan-Downloader.Win32.Agent
Fortinet W32/Agent.GPV!tr.dldr
AVG Win32:DropperX-gen [Drp]
Panda Trj/Chgt.AD