Summary | ZeroBOX

C.exe

Generic Malware Malicious Library UPX PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6403_us July 26, 2024, 6:58 p.m. July 26, 2024, 7 p.m.
Size 95.0KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 9474b528235299dbbd8e6d7520df48e3
SHA256 653643156a1d40a4be173edea122b0b20a68ce42f6c4e32d4425fe2c765467da
CRC32 C6E7E9BE
ssdeep 1536:zhzgDctWGkDWzOhIKtP7Zv41JQqa39ImLXL+BP1cyY2VsWjcdHg0LFkpvb0Sg:RXpkazOOKtTZQ7QCML+BPvY2aHg0LFky
PDB Path D:\Users\Carsten\Chimichurri\Release\Chimichurri.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleA

buffer: /Chimichurri/-->This exploit gives you a Local System shell <BR>
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: /Chimichurri/-->Usage: Chimichurri.exe ipaddress port <BR>
console_handle: 0x00000007
1 1 0
pdb_path D:\Users\Carsten\Chimichurri\Release\Chimichurri.pdb
BitDefenderTheta Gen:NN.ZexaF.36810.fuW@aWLp!7oi
Ikarus Win32.Outbreak
huorong HackTool/IIS.a
CrowdStrike win/malicious_confidence_100% (W)
alibabacloud HackTool:Win/IIS.AZ