Summary | ZeroBOX

ubt.exe

Malicious Library UPX Malicious Packer PE64 PE File OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6403_us July 11, 2024, 1:15 p.m. July 11, 2024, 1:41 p.m.
Size 73.0KB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 f8012ce30f73905e89212dcb0ff4a73b
SHA256 78111af024efbe39b61a9414e988db36d3937cac10d050e0f50d6a97cfe50c9b
CRC32 98C4237C
ssdeep 1536:26v1hyFWsAM2Xz/y1wD55Ds2/0VSjbVd3aPSs:jXywj5X2ql8StNYS
PDB Path C:\Users\Lenovo\Downloads\BypassUAC-master\BypassUAC-master\x64\Release\BypassUAC.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\Users\Lenovo\Downloads\BypassUAC-master\BypassUAC-master\x64\Release\BypassUAC.pdb
Bkav W64.AIDetectMalware
ESET-NOD32 a variant of Win64/HackTool.Agent.FB
APEX Malicious
Kaspersky HackTool.Win64.Knotweed.pv
Rising Hacktool.Agent!8.335 (CLOUD)
McAfeeD ti!78111AF024EF
Ikarus Trojan.Win64.Cobaltstrike
Google Detected
Microsoft Program:Win32/Wacapew.C!ml
ZoneAlarm HackTool.Win64.Knotweed.pv
DeepInstinct MALICIOUS
Malwarebytes Generic.Malware/Suspicious
TrendMicro-HouseCall TROJ_GEN.R002H0DGA24
Fortinet W64/Agent.FB!tr
alibabacloud HackTool:Win/Agent.FK