Summary | ZeroBOX

example3.exe

PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 April 17, 2024, 10:30 p.m. April 17, 2024, 10:30 p.m.
Size 39.0KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 9272f0b3dff945cedf3921f87cb718aa
SHA256 c535bc922819db75e4f1db455282c9a68f95d8dfad442b9c3a23d3d13f1a1765
CRC32 011516F1
ssdeep 768:iNow93ch8kgnXfRc1xC8oSUns9wRDd86rV86KcgsnUnj/nqvwSc+:iNow19nJSTSs9wRisV86Kc9Mjivtc+
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section .txt
section .l2
section {u'size_of_data': u'0x00008c00', u'virtual_address': u'0x00011000', u'entropy': 7.88467973800821, u'name': u'.txt', u'virtual_size': u'0x00009000'} entropy 7.88467973801 description A section with a high entropy has been found
entropy 0.921052631579 description Overall entropy of this PE file is high
Bkav W32.AIDetectMalware
MicroWorld-eScan Gen:Variant.Fragtor.541114
Cylance unsafe
BitDefender Gen:Variant.Fragtor.541114
Elastic malicious (high confidence)
APEX Malicious
Cynet Malicious (score: 100)
Emsisoft Gen:Variant.Fragtor.541114 (B)
Trapmine suspicious.low.ml.score
FireEye Generic.mg.9272f0b3dff945ce
MAX malware (ai score=83)
Gridinsoft Trojan.Heur!.032120A1
Xcitium Packed.Win32.MUPX.Gen@24tbus
BitDefenderTheta Gen:NN.ZexaCO.36802.cu0@a0wCsifi
DeepInstinct MALICIOUS
Panda Trj/Genetic.gen
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.300983.susgen