Summary | ZeroBOX

4d5a_2.exe

PE32 .NET DLL PE File DLL
Category Machine Started Completed
FILE s1_win7_x6402 Sept. 12, 2023, 10:01 a.m. Sept. 12, 2023, 10:02 a.m.
Size 185.0KB
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 2c61a7034a9263db96813262f0dffb80
SHA256 67f1c319d62659f38e1832e2ba01869d04217ac946040fd4d28c285b997c0667
CRC32 E85148C4
ssdeep 3072:l/D8FkghtTKPnXUPX3jcSOALERBGgHKYahecB3g5VxbgOMpkbdhXdkEWx0:lL8FkghGic946KYahecIbgOMcHW
Yara
  • Is_DotNET_DLL - (no description)
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

MicroWorld-eScan Gen:Variant.MSILHeracles.101263
Sangfor Suspicious.Win32.Save.a
CrowdStrike win/malicious_confidence_90% (D)
Arcabit Trojan.MSILHeracles.D18B8F
Cyren W32/MSIL_Troj.C.gen!Eldorado
ESET-NOD32 a variant of MSIL/Injector_AGen.EM
BitDefender Gen:Variant.MSILHeracles.101263
Emsisoft Gen:Variant.MSILHeracles.101263 (B)
VIPRE Gen:Variant.MSILHeracles.101263
FireEye Gen:Variant.MSILHeracles.101263
SentinelOne Static AI - Suspicious PE
GData Gen:Variant.MSILHeracles.101263
Google Detected
ALYac Gen:Variant.MSILHeracles.101263
MAX malware (ai score=88)
DeepInstinct MALICIOUS