Summary | ZeroBOX

version32.exe

Anti_VM PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6401 May 17, 2023, 7:09 a.m. May 17, 2023, 7:11 a.m.
Size 9.9MB
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 9889b03f358c1e2a2635ae17eb4bf489
SHA256 0c879e57aab759d1e31ba1ac2a03ffe1be3f44bd028a2dd4c597acec333b83d6
CRC32 36F19CCD
ssdeep 196608:bXGfFAvXKWv4hmvFGbMccfycpAkDOl1uJLCOHnJVx77DPf0:bXGtAvXKWQhYFEcfycGkDY1uomnXB0
Yara
  • IsPE64 - (no description)
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
pool.hashvault.pro 131.153.76.130
IP Address Status Action
131.153.76.130 Active Moloch
164.124.101.2 Active Moloch

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.101:59002 -> 164.124.101.2:53 2036289 ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) Crypto Currency Mining Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.101:49162
131.153.76.130:80
None None None

Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 159744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000620000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0
section {u'size_of_data': u'0x009c6e00', u'virtual_address': u'0x00020000', u'entropy': 7.663779632613575, u'name': u'.data', u'virtual_size': u'0x009c6e00'} entropy 7.66377963261 description A section with a high entropy has been found
entropy 0.984414945919 description Overall entropy of this PE file is high
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
FireEye Gen:Variant.Barys.429768
ALYac Gen:Variant.Barys.429768
Cylance unsafe
VIPRE Gen:Variant.Barys.429768
Sangfor Trojan.Win64.Kryptik.Vnn8
K7AntiVirus Trojan ( 005a1ffb1 )
Alibaba Trojan:Win64/Reflo.b82ecbcf
K7GW Trojan ( 005a1ffb1 )
CrowdStrike win/malicious_confidence_100% (W)
Arcabit Trojan.Barys.D68EC8
Cyren W64/Injector.BMR.gen!Eldorado
ESET-NOD32 a variant of Win64/GenKryptik.GIIA
Kaspersky Trojan.Win64.Reflo.bus
BitDefender Gen:Variant.Barys.429768
MicroWorld-eScan Gen:Variant.Barys.429768
Avast Win64:CrypterX-gen [Trj]
Tencent Win32.Trojan.FalseSign.Bdhl
Sophos Mal/Generic-S
F-Secure Trojan.TR/AD.Nekark.llpdl
TrendMicro TROJ_GEN.R03BC0DEG23
McAfee-GW-Edition Artemis!Trojan
Emsisoft Gen:Variant.Barys.429768 (B)
Ikarus Trojan.Win64.Krypt
Webroot W32.Trojan.Gen
Avira TR/AD.Nekark.llpdl
Antiy-AVL Trojan/Win64.GenKryptik
Gridinsoft Ransom.Win64.Sabsik.sa
Microsoft Trojan:Win32/Xmrig!ic
ZoneAlarm Trojan.Win64.Reflo.bus
GData Gen:Variant.Barys.429768
AhnLab-V3 Trojan/Win.Generic.C5404991
McAfee Artemis!9889B03F358C
MAX malware (ai score=83)
Malwarebytes Malware.AI.1534338468
Panda Trj/Chgt.AD
TrendMicro-HouseCall TROJ_GEN.R03BC0DEG23
Rising Trojan.Kryptik!8.8 (TFE:5:tSjl4DNY5BP)
Fortinet W32/Malicious_Behavior.SBX
AVG Win64:CrypterX-gen [Trj]
Cybereason malicious.a8b72c
DeepInstinct MALICIOUS