Summary | ZeroBOX

BigProject.exe

Generic Malware Malicious Library UPX PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 May 16, 2024, 9:03 a.m. May 16, 2024, 9:18 a.m.
Size 4.8MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 bcc6522e6cd09522a15bd196f39ae6fa
SHA256 9fac4bf8a43369d1960401c239e7e04c63613a7209f0b08f39fbd3262d0e555d
CRC32 6F6CEEE8
ssdeep 98304:LkqODj1f4pANcOfq3CG/AZYCtuxkKJAliPD7Wy38nr6KX0dCUh29/qH:YaGnrAH
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
bitbucket.org 104.192.141.1
IP Address Status Action
104.192.141.1 Active Moloch
164.124.101.2 Active Moloch

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
0x3e8

exception.instruction_r: 03 42 3c 89 85 f8 f9 ff ff c7 85 f4 f9 ff ff 00
exception.symbol: bigproject+0x1d6f10
exception.instruction: add eax, dword ptr [edx + 0x3c]
exception.module: BigProject.exe
exception.exception_code: 0xc0000005
exception.offset: 1928976
exception.address: 0xd46f10
registers.esp: 4152660
registers.edi: 0
registers.eax: 0
registers.ebp: 4368572
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 24447
registers.ecx: 1000
1 0 0
section {u'size_of_data': u'0x00029000', u'virtual_address': u'0x004a5000', u'entropy': 6.810218660293748, u'name': u'.reloc', u'virtual_size': u'0x00028f18'} entropy 6.81021866029 description A section with a high entropy has been found
Bkav W32.Common.9D3B9E3B
Lionic Trojan.Win32.GenericML.4!c
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
ALYac Gen:Variant.Lazy.471907
VIPRE Gen:Variant.Lazy.471907
Sangfor Suspicious.Win32.Save.a
BitDefender Gen:Variant.Lazy.471907
Arcabit Trojan.Lazy.D73363
VirIT Trojan.Win32.Genus.VSX
Symantec Trojan Horse
ESET-NOD32 a variant of Win32/TrojanDownloader.Agent_AGen.GK
APEX Malicious
Avast Win32:DropperX-gen [Drp]
Kaspersky UDS:DangerousObject.Multi.Generic
MicroWorld-eScan Gen:Variant.Lazy.471907
Rising Trojan.Generic@AI.100 (RDML:9JdheAj1jMiIpvrcWfnRNA)
Emsisoft Gen:Variant.Lazy.471907 (B)
F-Secure Trojan.TR/Dldr.Agent_AGen.rawsq
TrendMicro TrojanSpy.Win32.REDLINE.YXEEOZ
Trapmine malicious.high.ml.score
FireEye Generic.mg.bcc6522e6cd09522
Sophos Mal/Generic-S
Ikarus Trojan-Downloader.Win32.Agent
Webroot W32.Dropper.Gen
Google Detected
Avira TR/Dldr.Agent_AGen.rawsq
MAX malware (ai score=87)
Antiy-AVL Trojan/Win32.Sonbokli
Kingsoft Win32.Trojan.GenericML.xnet
Gridinsoft Malware.Win32.RedLine.tr
Microsoft PWS:Win32/Vigorf.A
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Gen:Variant.Lazy.471907
Varist W32/ABRisk.OKSD-0230
AhnLab-V3 Dropper/Win.Generic.C5622285
BitDefenderTheta AI:Packer.72C9714A21
DeepInstinct MALICIOUS
Malwarebytes Spyware.RedLineStealer
TrendMicro-HouseCall TrojanSpy.Win32.REDLINE.YXEEOZ
SentinelOne Static AI - Suspicious PE
Fortinet PossibleThreat.PALLAS.H
AVG Win32:DropperX-gen [Drp]
Paloalto generic.ml