Summary | ZeroBOX

inte.exe

UPX Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 7, 2024, 7:02 p.m. July 7, 2024, 7:05 p.m.
Size 220.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 cd0fd465ea4fd58cf58413dda8114989
SHA256 a5f4270eed2a341acb58267cfaca48cfd25d5d5921b6f4d7e856ef4b5fd85dbe
CRC32 2934C460
ssdeep 3072:Kj9Wt0dASUNee76IR+tXe/ZHwYjpu8lULeJQ7k7wE65/:2cgUNj2DtXe/ZQKu7k7W
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2656
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 114688
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0214c000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2656
region_size: 184320
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00320000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
name RT_ICON language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x01b7d2d0 size 0x000010a8
name RT_GROUP_ICON language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x01b7e378 size 0x00000014
section {u'size_of_data': u'0x00024800', u'virtual_address': u'0x0000c000', u'entropy': 6.962896807838568, u'name': u'.rdata', u'virtual_size': u'0x000247ce'} entropy 6.96289680784 description A section with a high entropy has been found
entropy 0.666666666667 description Overall entropy of this PE file is high
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Tepfer.i!c
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win32.Lockbit.dh
ALYac Gen:Variant.Zusy.546962
Cylance Unsafe
VIPRE Gen:Variant.Zusy.546962
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005b5da91 )
BitDefender Gen:Variant.Zusy.546962
K7GW Trojan ( 005b5da91 )
Cybereason malicious.5ea4fd
Arcabit Trojan.Zusy.D85892
VirIT Trojan.Win32.Stealc.A
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 a variant of Win32/Kryptik.HXCL
APEX Malicious
McAfee Artemis!CD0FD465EA4F
Avast Win32:Evo-gen [Trj]
ClamAV Win.Packed.Fareit-10030127-0
Kaspersky HEUR:Trojan-PSW.Win32.Tepfer.gen
Alibaba Ransom:Win32/StopCrypt.f3f823bc
NANO-Antivirus Trojan.Win32.Kryptik.knmghx
MicroWorld-eScan Gen:Variant.Zusy.546962
Rising Stealer.Tepfer!8.13357 (CLOUD)
Emsisoft Gen:Variant.Zusy.546962 (B)
F-Secure Heuristic.HEUR/AGEN.1318112
DrWeb Trojan.DownLoader46.64773
Zillya Trojan.Kryptik.Win32.4802624
TrendMicro Trojan.Win32.GCLEANER.YXEEUZ
McAfeeD Real Protect-LS!CD0FD465EA4F
Trapmine malicious.high.ml.score
FireEye Generic.mg.cd0fd465ea4fd58c
Sophos Troj/Krypt-AEE
Ikarus Trojan.Win32.Stealc
Webroot W32.Tepfer
Google Detected
Avira HEUR/AGEN.1318112
MAX malware (ai score=86)
Antiy-AVL Trojan[PSW]/Win32.Tepfer
Kingsoft Win32.Trojan-PSW.Tepfer.gen
Gridinsoft Malware.Win32.Gen.tr
Microsoft Ransom:Win32/StopCrypt.RV!MTB
ViRobot Trojan.Win.Z.Kryptik.225280.AY
ZoneAlarm HEUR:Trojan-PSW.Win32.Tepfer.gen
GData Gen:Variant.Zusy.546962
Varist W32/ABTrojan.EHMW-5987
AhnLab-V3 Ransomware/Win.StopCrypt.R649030