Summary | ZeroBOX

HeaderFinder.exe

Icarus Stealer PE32 .NET EXE PE File
Category Machine Started Completed
FILE s1_win7_x6401 March 20, 2024, 2:36 p.m. March 20, 2024, 2:38 p.m.
Size 550.5KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 5f3c52c804bf6adadac97e2e53179bee
SHA256 6846565038cf634e9eb81a923f408e5fe4c2170e27ceb40856968a38d59c3db1
CRC32 EA03482B
ssdeep 12288:zZdfrXg+JwuKt/S/60G3SpaFKnXNFcTFNJL:zfw+Jwz/S/6cMkKT
PDB Path C:\Users\clubpc5\Documents\HeaderFinder\HeaderFinder\HeaderFinder\obj\Debug\HeaderFinder.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
  • Icarus_Stealer - Icarus Stealer
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
pdb_path C:\Users\clubpc5\Documents\HeaderFinder\HeaderFinder\HeaderFinder\obj\Debug\HeaderFinder.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 1703936
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x008b0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x727a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x727a2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 1638400
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00d70000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ec0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003d2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003ec000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00740000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00405000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00407000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003f6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003da000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003fa000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003f7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00089000', u'virtual_address': u'0x00002000', u'entropy': 7.988041930814891, u'name': u'.text', u'virtual_size': u'0x00088e74'} entropy 7.98804193081 description A section with a high entropy has been found
entropy 0.996363636364 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.TelegramBot.4!c
Elastic malicious (high confidence)
Skyhigh BehavesLike.Win32.Generic.hc
ALYac Trojan.GenericKD.71742547
Cylance unsafe
VIPRE Trojan.GenericKD.71742547
Sangfor Trojan.Win32.Telegrambot.Vaf8
BitDefender Trojan.GenericKD.71742547
Cybereason malicious.804bf6
Arcabit Trojan.Generic.D446B453
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of MSIL/TelegramBot.G potentially unsafe
APEX Malicious
McAfee GenericRXVM-YH!5F3C52C804BF
Avast Win32:Malware-gen
MicroWorld-eScan Trojan.GenericKD.71742547
Rising PUA.TelegramBot!8.18C7D (CLOUD)
Emsisoft Trojan.GenericKD.71742547 (B)
FireEye Trojan.GenericKD.71742547
Sophos Mal/Generic-S
Ikarus Trojan.MSIL.PSW
Google Detected
MAX malware (ai score=83)
Antiy-AVL RiskWare/MSIL.TelegramBot
Microsoft Trojan:Win32/Casdet!rfn
ViRobot Trojan.Win.Z.Telegrambot.563712
GData Trojan.GenericKD.71742547
Varist W32/MSIL_Agent.GWX.gen!Eldorado
AhnLab-V3 Trojan/Win.Generic.C5415737
BitDefenderTheta Gen:NN.ZemsilF.36802.Im0@aO9UQSp
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.985663552
TrendMicro-HouseCall TROJ_GEN.R002H06BM24
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.234999163.susgen
Fortinet Adware/TelegramBot
AVG Win32:Malware-gen
CrowdStrike win/malicious_confidence_100% (W)
alibabacloud Trojan:MSIL/TelegramBot.G