Summary | ZeroBOX

app64.dll

Malicious Library PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6403_us July 14, 2023, 7:31 a.m. July 14, 2023, 7:41 a.m.
Size 3.4MB
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 4aa7e4b29ba9c9c9a44ed8c096758956
SHA256 ff095e003a2c682f621f38fb626de2634479216803a401a144650b5fb24b9c7c
CRC32 CC1BAB8D
ssdeep 98304:/2FxZcK+W4xOvxSjuQxOYwRp/SfUrOVGMoOC6UeKmAhYhma:Ic4c0x/V3SsrHMoNyw
Yara
  • IsDLL - (no description)
  • IsPE64 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
142.250.74.78 Active Moloch
164.124.101.2 Active Moloch
5.42.65.67 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
section .%oP
section .qBc
section .d'P
resource name BOOTOP
suspicious_features HTTP version 1.0 used, Connection to IP address suspicious_request GET http://142.250.74.78/
request GET http://142.250.74.78/
section {u'size_of_data': u'0x0036ba00', u'virtual_address': u'0x00183000', u'entropy': 7.775645674404799, u'name': u".d'P", u'virtual_size': u'0x0036b928'} entropy 7.7756456744 description A section with a high entropy has been found
entropy 0.99871685201 description Overall entropy of this PE file is high
host 142.250.74.78
host 5.42.65.67
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.68154159
FireEye Generic.mg.4aa7e4b29ba9c9c9
Sangfor Trojan.Win32.Coroxy.V30o
CrowdStrike win/malicious_confidence_100% (W)
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win64/Coroxy.C.gen
Cynet Malicious (score: 100)
APEX Malicious
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Trojan.GenericKD.68154159
Avast Win64:MalwareX-gen [Trj]
DrWeb Trojan.Packed2.45445
McAfee-GW-Edition BehavesLike.Win64.Generic.wc
Emsisoft Trojan.GenericKD.68154159 (B)
Gridinsoft Malware.Win64.Gen.bot
Microsoft Trojan:Win32/Casdet!rfn
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Trojan.GenericKD.68154159
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5452785
McAfee Artemis!4AA7E4B29BA9
MAX malware (ai score=88)
Panda Trj/Chgt.AD
TrendMicro-HouseCall TROJ_GEN.R002H0DGD23
Rising Trojan.Coroxy!8.10E83 (CLOUD)
Ikarus Trojan.Win64.Coroxy
AVG Win64:MalwareX-gen [Trj]
DeepInstinct MALICIOUS