Summary | ZeroBOX

reverse.exe

Metasploit Generic Malware PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 5, 2024, 10:37 a.m. Aug. 5, 2024, 10:52 a.m.
Size 7.0KB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 58840f757810108421b4ff20ec0a7c0b
SHA256 5571da8b626b5273d42c976e57d66906060d534046b7d279edfa11b68dfe091e
CRC32 4052DADF
ssdeep 24:eFGStrJ9u0/6+RnZdkBQAVxcRwKZqpeNDMSCvOXpmB:is0vhkBQNRwjSD9C2kB
Yara
  • Windows_Trojan_Metasploit_91bc5d7d - (no description)
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • Generic_Malware_Zero - Generic Malware

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
147.78.47.15 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section .jdlj
host 147.78.47.15
dead_host 147.78.47.15:4547
Bkav W64.AIDetectMalware
MicroWorld-eScan Trojan.Metasploit.A
CAT-QuickHeal HackTool.Metasploit.S9212471
ALYac Trojan.Metasploit.A
Cylance Unsafe
VIPRE Trojan.Metasploit.A
Sangfor HackTool.Win32.Reverse64_Bin_v2_5_through_v4_x.uwccg
K7AntiVirus Trojan ( 004fae881 )
K7GW Trojan ( 004fae881 )
Cybereason malicious.578101
Symantec Trojan Horse
ESET-NOD32 a variant of Win64/Rozena.M
APEX Malicious
Cynet Malicious (score: 100)
SUPERAntiSpyware Trojan.Agent/Gen-MalPack
Emsisoft Trojan.Metasploit.A (B)
F-Secure Trojan.TR/Crypt.XPACK.Gen7
DrWeb BackDoor.Shell.244
McAfeeD Real Protect-LS!58840F757810
Trapmine malicious.high.ml.score
Sophos ATK/Meter-A
Ikarus Trojan.Win64.Meterpreter
Jiangmin Trojan.Generic.auyjj
Avira TR/Crypt.XPACK.Gen7
Antiy-AVL GrayWare/Win32.Rozena.j
Kingsoft malware.kb.b.980
Gridinsoft Trojan.Win64.ShellCode.sd!s1
Arcabit Trojan.Metasploit.A
ZoneAlarm HEUR:Trojan.Win64.Packed.gen
Google Detected
AhnLab-V3 Trojan/Win32.RL_Generic.R357794
Acronis suspicious
DeepInstinct MALICIOUS
Malwarebytes Trojan.Dropper.Generic
Zoner Probably Heur.ExeHeaderL
Tencent Hacktool.Win64.Rozena.a
Yandex Trojan.GenAsa!RZuPNlUDbQk
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet W64/Rozena.J!tr
CrowdStrike win/malicious_confidence_100% (D)
alibabacloud Backdoor:Win/shellcode.api(dyn)