Summary | ZeroBOX

cccc.exe

Antivirus PE32 PE File .NET EXE
Category Machine Started Completed
FILE s1_win7_x6401 April 10, 2024, 1:44 p.m. April 10, 2024, 1:44 p.m.
Size 45.5KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 e93bd9e06b8b09c7f697bff19e1da942
SHA256 de74d9f4418390f531456319015719dbcee1d5692b4b19800e7a492218d0badc
CRC32 48B0B9B3
ssdeep 768:vgldQdGQgrLcynjI9+cgA3YyuUYDnom96d+AH1FxotCJbadWONHmTIJSeK:vCdQdGbrLcEGIA3Yyu7Dnom96NHfutg2
PDB Path d:\00. PROJECT\BOT\ExclusionPath\ExclusionPath\obj\Debug\ExclusionPath.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • Antivirus - Contains references to security software
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path d:\00. PROJECT\BOT\ExclusionPath\ExclusionPath\obj\Debug\ExclusionPath.pdb
section {u'size_of_data': u'0x00009600', u'virtual_address': u'0x00004000', u'entropy': 7.780896431538823, u'name': u'.rsrc', u'virtual_size': u'0x000094b0'} entropy 7.78089643154 description A section with a high entropy has been found
entropy 0.833333333333 description Overall entropy of this PE file is high
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Generic.4!c
ALYac Gen:Variant.Tedy.350562
Sangfor Trojan.Win32.Agent.Vr2v
CrowdStrike win/malicious_confidence_100% (W)
Symantec ML.Attribute.HighConfidence
APEX Malicious
Kaspersky UDS:DangerousObject.Multi.Generic
MicroWorld-eScan Gen:Variant.Tedy.350562
TrendMicro Trojan.Win32.SMOKELOADER.YXEDIZ
Emsisoft Gen:Variant.Tedy.350562 (B)
Kingsoft Win32.Troj.Unknown.a
Gridinsoft Malware.Win32.ZgRAT.tr
ZoneAlarm UDS:DangerousObject.Multi.Generic
Malwarebytes Trojan.Downloader.MSIL
TrendMicro-HouseCall Trojan.Win32.SMOKELOADER.YXEDIZ
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet Malicious_Behavior.SB