Summary | ZeroBOX

7juwy31nzd44.exe

Malicious Library Antivirus UPX Malicious Packer PE64 PE File OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6401 Jan. 14, 2024, 1:33 p.m. Jan. 14, 2024, 1:42 p.m.
Size 696.5KB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 a1be5a9cc2660e483c811d758fa8ed51
SHA256 a9b29d40d6f4afd429412a831266e8290567e2347889c0c061ccd4866c55bfb9
CRC32 7350F06B
ssdeep 6144:xRwFYknviMev8XMwlugUu1CRt66onaN0K+PRqig5TJwT0gEmZSoM:jwFYS3+8X4u1CRt6KN0VJqfTy0gAoM
Yara
  • Malicious_Library_Zero - Malicious_Library
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • Antivirus - Contains references to security software
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section _RDATA
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Skyhigh BehavesLike.Win64.Dropper.jm
Symantec ML.Attribute.HighConfidence
APEX Malicious
McAfee RDN/wacapew
Avast Win64:RATX-gen [Trj]
Kaspersky UDS:DangerousObject.Multi.Generic
Rising Downloader.Agent!8.B23 (CLOUD)
TrendMicro Trojan.Win64.SMOKELOADER.YXEAMZ
Sophos Mal/Generic-S
Webroot W32.Malware.Gen
Microsoft Trojan:Win32/Casdet!rfn
ZoneAlarm UDS:DangerousObject.Multi.Generic
DeepInstinct MALICIOUS
TrendMicro-HouseCall Trojan.Win64.SMOKELOADER.YXEAMZ
Fortinet W32/PossibleThreat
AVG Win64:RATX-gen [Trj]
CrowdStrike win/malicious_confidence_70% (D)