Summary | ZeroBOX

dl.exe

UPX Malicious Library OS Processor Check PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 19, 2023, 5:44 p.m. Sept. 19, 2023, 5:57 p.m.
Size 1.8MB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 7f0896a41cb033b9b9892db59dad9d54
SHA256 53fc3d174ec081735d8873ac67491fad02ed62cd3ff161d9bd3e215a15a8f0ab
CRC32 718FABAB
ssdeep 49152:lmw8L1JDubwr8MhTcaZKXMWrVaG/NtYAGkUn0GATngt:0w8ZJDcwgMNRdWrkCtYAGkUnQ
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section _RDATA
Bkav W32.AIDetectMalware.64
McAfee Artemis!7F0896A41CB0
Zillya Dropper.Agent.Script.405
McAfee-GW-Edition BehavesLike.Win64.Dropper.tc
Jiangmin Trojan.Generic.hrfzm
Gridinsoft Ransom.Win64.Wacatac.oa!s1
DeepInstinct MALICIOUS
section {u'size_of_data': u'0x0000f200', u'virtual_address': u'0x00052000', u'entropy': 7.3562394962991196, u'name': u'.rsrc', u'virtual_size': u'0x0000f004'} entropy 7.3562394963 description A section with a high entropy has been found