Summary | ZeroBOX

Update.exe

Generic Malware Malicious Library UPX Malicious Packer PE64 PE File OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6403_us Feb. 8, 2024, 5:49 p.m. Feb. 8, 2024, 5:51 p.m.
Size 2.9MB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 db25dde66c6101eb5c357a1fecb34925
SHA256 59f21e4329cbd8850b396247ca86b79a465dc78d97e00deca22b8682a6f23532
CRC32 9D108EB5
ssdeep 49152:mY3ovEXrxYMJID2qHRTGEWEd7VMfh3lkKM/QbaclDEHyi:mY4vhKF3VOMDEHP
Yara
  • Malicious_Library_Zero - Malicious_Library
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check

IP Address Status Action
103.215.221.168 Active Moloch
164.124.101.2 Active Moloch
182.162.106.144 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49162 -> 103.215.221.168:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49162
103.215.221.168:443
C=US, O=Let's Encrypt, CN=R3 CN=anonhost.in a5:70:e5:c8:db:89:e6:4e:96:15:9e:a2:9f:c7:84:87:21:3d:76:c5

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: thread '
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: main
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: ' panicked at
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: src\main.rs
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: Failed to download the file: reqwest::Error { kind: Request, url: Url { scheme: "https", cannot_be_a_base: false, username: "", password: None, host: Some(Domain("anonhost.in")), port: None, path: "/vlog2/uploads/putty.bat", query: None, fragment: None }, source: hyper::Error(Connect, Os { code: -2146762495, kind: Uncategorized, message: "A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file." }) }
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
console_handle: 0x000000000000000b
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
request GET http://apps.identrust.com/roots/dstrootcax3.p7c
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob