Summary | ZeroBOX

new-image_j.jpg.exe

Malicious Library UPX .NET DLL PE File DLL OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 July 4, 2024, 10:11 a.m. July 4, 2024, 10:11 a.m.
Size 2.8MB
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 f0fd5b8e5113d5a7afc164e15d732129
SHA256 1c9c5dd8687063a08ec259c46db5f3c0ad614530129a634e5944b9b085023bc2
CRC32 ED12E9DC
ssdeep 24576:vDWPdErzb1+Oe5vepu3NkxO5nUKzmBlaE7i3dmq3zbhdFWueMHo76o2Biz2G:vDW8bNQ40U1faE7i3Qqj7gz2B
PDB Path dnlib.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • Is_DotNET_DLL - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path dnlib.pdb
Ikarus Trojan.MSIL.Injector
Google Detected
Varist W32/Injector.BTO.gen!Eldorado
SentinelOne Static AI - Suspicious PE