Summary | ZeroBOX

umOKKIbUBdaJ.exe

Generic Malware Malicious Library UPX Malicious Packer PE64 PE File dll OS Processor Check DllRegisterServer
Category Machine Started Completed
FILE s1_win7_x6403_us June 26, 2024, 10:08 a.m. June 26, 2024, 10:10 a.m.
Size 5.6MB
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 608321f2d1044c6c22eeb66205e53650
SHA256 efa8c6ecd88a7c400ff0b28ec7e5d2052943546f4c41dc41c3702dc73e9d0756
CRC32 BE9D30D4
ssdeep 49152:YzmL+zbXEoqq1OQmf/csUgUk0WgwH20j9e7Esrp4AjE5EjwMh49cA0fAVXr15Tdy:YmLEbMIqPH20RvEW3TY
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE64 - (no description)
  • DllRegisterServer_Zero - execute regsvr32.exe
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 5368498400
registers.r15: 0
registers.rcx: -1
registers.rsi: 4125697
registers.r10: 3221225480
registers.rbx: -10000
registers.rsp: 4125848
registers.r11: 514
registers.r8: 4125888
registers.r9: 350
registers.rdx: 0
registers.r12: 4126416
registers.rbp: 4125912
registers.rdi: 5362924640
registers.rax: 0
registers.r13: 5767072
1 0 0
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Agent.Y!c
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win64.Ransomblackbyte.th
McAfee Artemis!608321F2D104
Sangfor Trojan.Win32.Agent.Vr3p
K7AntiVirus Trojan ( 005af30d1 )
BitDefender Trojan.GenericKD.73282720
K7GW Trojan ( 005af30d1 )
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of WinGo/TrojanDropper.Agent.CS
APEX Malicious
Avast Win64:Malware-gen
Kaspersky Trojan.MSIL.Agent.qwitvv
Alibaba TrojanDropper:MSIL/Genric.498c4695
MicroWorld-eScan Trojan.GenericKD.73282720
Rising Trojan.Injector!1.F43F (CLASSIC)
F-Secure Heuristic.HEUR/AGEN.1372589
TrendMicro Trojan.Win64.PRIVATELOADER.YXEFYZ
McAfeeD ti!EFA8C6ECD88A
FireEye Trojan.GenericKD.73282720
Sophos Mal/Generic-S
Ikarus Trojan.WinGo.Agent
Webroot W32.Trojan.Gen
Google Detected
Avira HEUR/AGEN.1372589
MAX malware (ai score=84)
Antiy-AVL Trojan/Win32.Caynamer
Kingsoft MSIL.Trojan.Agent.qwitvv
Gridinsoft Ransom.Win64.Sabsik.sa
Microsoft Trojan:Win32/Casdet!rfn
ViRobot Trojan.Win.Z.Agent.5886464
ZoneAlarm Trojan.MSIL.Agent.qwitvv
GData Win64.Trojan.Agent.H15ZQ7
AhnLab-V3 Trojan/Win.Evo-gen.C5558850
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.2808749342
TrendMicro-HouseCall Trojan.Win64.PRIVATELOADER.YXEFYZ
MaxSecure Win.MxResIcn.Heur.Gen
Fortinet W32/Agent.CS!tr
AVG Win64:Malware-gen
Paloalto generic.ml
CrowdStrike win/malicious_confidence_100% (W)
alibabacloud Trojan[dropper]:Multi/Agent.CB