Summary | ZeroBOX

doc.exe

UPX OS Processor Check PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us July 30, 2024, 10:09 a.m. July 30, 2024, 10:11 a.m.
Size 19.5KB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 8f92f52bffea35771a435d8d0ac04b0d
SHA256 1979b3e9366928d0774a41e8bd5e7610a0302cdf62e9a533d2ff6c5ff7c346e9
CRC32 B0DCAD59
ssdeep 384:mYSRbM/Que/ldFtXfGG4Avmdq95b6kHe5U:TQ3/ldFDTvGqzpHT
PDB Path D:\Pentest\tools\Voidgate\voidgate-master\x64\Release\Voidgate.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path D:\Pentest\tools\Voidgate\voidgate-master\x64\Release\Voidgate.pdb
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/Injector.QR
APEX Malicious
McAfee Artemis!8F92F52BFFEA
Rising Malware.Undefined!8.C (TFE:5:pnNXHYOY5pO)
McAfeeD ti!1979B3E93669
Google Detected
Microsoft Trojan:Win32/Wacatac.B!ml
DeepInstinct MALICIOUS
Malwarebytes Generic.Malware/Suspicious
Ikarus Trojan.Win64.Injector
MaxSecure Trojan.Malware.300983.susgen
CrowdStrike win/malicious_confidence_90% (D)
alibabacloud Trojan:Win/Injector.QV