Summary | ZeroBOX

rev.exe

Malicious Library UPX Malicious Packer PE64 PE File OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6403_us July 11, 2024, 1:17 p.m. July 11, 2024, 1:35 p.m.
Size 1.4MB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 35f6193692dc722a7b3384ccd2ab6778
SHA256 0e9730e45457039d8ccccb70ce5bb67227bb4e10c94ced404fcc250a6732e6f6
CRC32 9537DB79
ssdeep 12288:8wJfSbg6CyI8nPSueJdUqmrYaKKyYIqX/6a2jsWWW72iQdlTz7Q6zP9YRaFuaicr:BkbSuYOyYlXCjQZzqRoPi9shwjVugW
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section .symtab
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.r14: 5688032
registers.r15: 0
registers.rcx: -1
registers.rsi: 2292481
registers.r10: 3221225480
registers.rbx: -10000
registers.rsp: 2292760
registers.r11: 514
registers.r8: 2292800
registers.r9: 350
registers.rdx: 0
registers.r12: 2293320
registers.rbp: 2292816
registers.rdi: 4428928
registers.rax: 0
registers.r13: 0
1 0 0
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (moderate confidence)
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win64.Backdoor.th
Cylance Unsafe
Symantec ML.Attribute.HighConfidence
Kaspersky UDS:DangerousObject.Multi.Generic
McAfeeD ti!0E9730E45457
Ikarus Win32.Outbreak
Google Detected
Kingsoft Win32.Troj.Unknown.a
Microsoft Program:Win32/Wacapew.C!ml
ZoneAlarm UDS:DangerousObject.Multi.Generic
DeepInstinct MALICIOUS
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.300983.susgen
Paloalto generic.ml
CrowdStrike win/malicious_confidence_60% (D)