Summary | ZeroBOX

putty.exe

UPX Malicious Library OS Processor Check PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 10, 2023, 6:22 p.m. Oct. 10, 2023, 6:24 p.m.
Size 1.2MB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 1d5ad4a60ec9be32c11ad99f234bfe8f
SHA256 f59035192098e44b86c4648a0de4078edbe80352260276f4755d15d354f5fc58
CRC32 9A12792F
ssdeep 24576:tMBcqyK86pA7yPxYdC70iQMN+PeTNzA9NIVzlMRGKwQ7Yv0IgvIgXxv7zMo:tMBc2QyJ0iQMNkeTNzA9NIVzJXQ7+0YV
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section _RDATA
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0
section {u'size_of_data': u'0x0003c000', u'virtual_address': u'0x000e3000', u'entropy': 7.961147943458464, u'name': u'.data', u'virtual_size': u'0x000404b0'} entropy 7.96114794346 description A section with a high entropy has been found
entropy 0.200250312891 description Overall entropy of this PE file is high
registry HKEY_LOCAL_MACHINE\SOFTWARE\SimonTatham\PuTTY\CHMPath\(Default)
registry HKEY_LOCAL_MACHINE\SOFTWARE\SimonTatham\PuTTY64\CHMPath\(Default)
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win64.Generic.th
ALYac Trojan.GenericKD.69613711
Malwarebytes Generic.Malware/Suspicious
VIPRE Trojan.GenericKD.69613711
Sangfor Trojan.Win64.Nukesped.Vj3f
Alibaba Trojan:Win64/NukeSped.e3df193e
CrowdStrike win/malicious_confidence_100% (W)
Symantec Trojan.Gen.MBT
ESET-NOD32 a variant of Win64/NukeSped.QI
APEX Malicious
BitDefender Trojan.GenericKD.69613711
MicroWorld-eScan Trojan.GenericKD.69613711
Avast Win64:MalwareX-gen [Trj]
Rising Trojan.NukeSped!8.3184 (CLOUD)
Emsisoft Trojan.GenericKD.69613711 (B)
F-Secure Trojan.TR/NukeSped.ouvlk
TrendMicro TROJ_FRS.VSNTJ623
Trapmine malicious.high.ml.score
FireEye Trojan.GenericKD.69613711
Sophos Generic Reputation PUA (PUA)
GData Trojan.GenericKD.69613711
Avira TR/NukeSped.ouvlk
MAX malware (ai score=83)
Antiy-AVL Trojan/Win64.NukeSped
Gridinsoft Ransom.Win64.Wacatac.sa
Arcabit Trojan.Generic.D426388F
Microsoft Trojan:Win32/ScarletFlash.A
Google Detected
McAfee Artemis!1D5AD4A60EC9
Cylance unsafe
TrendMicro-HouseCall TROJ_FRS.VSNTJ623
Tencent Win32.Trojan.Nukesped.Ncnw
Ikarus Trojan.Win64.Nukesped
AVG Win64:MalwareX-gen [Trj]
DeepInstinct MALICIOUS