Summary | ZeroBOX

24_06.zip

ZIP Format
Category Machine Started Completed
FILE s1_win7_x6402 June 28, 2023, 9:21 a.m. June 28, 2023, 9:24 a.m.
Size 2.1MB
Type Zip archive data, at least v2.0 to extract
MD5 ad691fbd485d94a8fae1a008b081ec80
SHA256 ed254a0123ff6810a50bb1e1dff3d60c42d3bc4c7b067073251291c3cb94e82d
CRC32 76A957BB
ssdeep 49152:plVe5PWZ5FvcB1ZjQXorDcQhg7dMnEBJCgkh3V/4msgca3DQDy:pbAP+U1qWg7OEB1kh3Vu6DUy
Yara
  • zip_file_format - ZIP file format

IP Address Status Action
164.124.101.2 Active Moloch
62.172.138.8 Active Moloch
95.179.140.179 Active Moloch

suspicious_features GET method with no useragent header suspicious_request GET http://geo.netsupportsoftware.com/location/loca.asp
request GET http://geo.netsupportsoftware.com/location/loca.asp
Lionic Riskware.ZIP.NetSup.1!c
Alibaba RiskWare:Win32/NetSup.792a120c
Cyren W32/Tool.EQYN-2153
ESET-NOD32 Win32/NetSupportManager.AD
Kaspersky not-a-virus:RemoteAdmin.Win32.NetSup.i
Rising HackTool.NetSupport!1.E317 (CLASSIC)
DrWeb Program.RemoteAdmin.837
Zillya Trojan.GenCBL.Win32.9416
McAfee-GW-Edition Artemis!Trojan
Jiangmin RemoteAdmin.NetSup.h
ZoneAlarm not-a-virus:HEUR:RemoteAdmin.Win32.NetSup.gen
Google Detected
Tencent Win32.Trojan.Netsup.Ewnw
Yandex Riskware.RemoteAdmin!myez5VmqQPE
MaxSecure Trojan.Malware.73446946.susgen
Fortinet Riskware/Application