Summary | ZeroBOX

c53cfff621a84792162f70e790980e38.exe

Malicious Library PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us July 1, 2023, 12:36 p.m. July 1, 2023, 12:39 p.m.
Size 4.1MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7f6638a6d92964abac556675bb6b669d
SHA256 8c9eac1afdc09d38a88354b513496f5ae5a9a579f446c020c12988b39ba95648
CRC32 80AA0C09
ssdeep 98304:2RRu7JlHIqCfORsvc+0by6a+tN8vWZ2P1VDRDL5tTNz7a:2RQtlo9WJCqN8vgI11zW
PDB Path C:\kaxobacosuzati_cohugeb.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\kaxobacosuzati_cohugeb.pdb
resource name DOKUCODAPET
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4161536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02610000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2084
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4161536
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02610000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 9351168
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02a10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00407600', u'virtual_address': u'0x00001000', u'entropy': 7.998636024383065, u'name': u'.text', u'virtual_size': u'0x00407552'} entropy 7.99863602438 description A section with a high entropy has been found
entropy 0.984488724496 description Overall entropy of this PE file is high
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
DrWeb Trojan.Siggen20.64756
MicroWorld-eScan Trojan.GenericKD.67658474
FireEye Generic.mg.7f6638a6d92964ab
CAT-QuickHeal Trojan.IGENERIC
ALYac Trojan.GenericKD.67658474
Malwarebytes Trojan.MalPack.GS
Sangfor Trojan.Win32.Save.a
K7AntiVirus Riskware ( 0040eff71 )
Alibaba Trojan:Win32/Chapak.5be9da48
K7GW Riskware ( 0040eff71 )
Cybereason malicious.902740
Arcabit Trojan.Generic.D40862EA
VirIT Trojan.Win32.Genus.RNB
Cyren W32/ABRisk.SSUJ-7199
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HTWG
Cynet Malicious (score: 100)
APEX Malicious
ClamAV Win.Packer.pkr_ce1a-9980177-0
Kaspersky HEUR:Trojan.Win32.Chapak.gen
BitDefender Trojan.GenericKD.67658474
Avast Win32:CrypterX-gen [Trj]
Tencent Malware.Win32.Gencirc.10befc00
Emsisoft Trojan.GenericKD.67658474 (B)
F-Secure Trojan.TR/AD.CloudGenRKIT.xxlef
VIPRE Trojan.GenericKD.67658474
TrendMicro Trojan.Win32.AMADEY.YXDFUZ
McAfee-GW-Edition BehavesLike.Win32.Lockbit.rc
Trapmine suspicious.low.ml.score
Sophos Troj/Krypt-VZ
Avira TR/AD.CloudGenRKIT.xxlef
MAX malware (ai score=83)
Antiy-AVL GrayWare/Win32.Wacapew
Gridinsoft Trojan.Win32.Glupteba.bot
Xcitium Malware@#2rc798gup7c8u
Microsoft Trojan:Win32/Amadey.GKC!MTB
ViRobot Trojan.Win.Z.Wacapew.4295040
ZoneAlarm HEUR:Trojan.Win32.Chapak.gen
GData Win32.Trojan.PSE.1O25370
Google Detected
AhnLab-V3 Trojan/Win.Generic.R577222
Acronis suspicious
McAfee Artemis!7F6638A6D929
VBA32 Trojan.Buzus
Cylance unsafe
Panda Trj/Chgt.AD
TrendMicro-HouseCall Trojan.Win32.AMADEY.YXDFUZ