Summary | ZeroBOX

222fastsetup.exe

Generic Malware Admin Tool (Sysinternals etc ...) UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 12, 2024, 11:27 a.m. Aug. 12, 2024, 11:36 a.m.
Size 2.5MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 d9c2521c8dd6cfdb84244a46a681dfa8
SHA256 a38b514a313e566ffef61acfc7bb9fd07c0499cb87cc795815e84eb2618427c9
CRC32 1F342E78
ssdeep 49152:3b/FFiGqsqUTUZefhTfOJrqXA/5jn917fFHrle:3i+ULdo
Yara
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
fixz5sb.top 104.21.79.151
IP Address Status Action
164.124.101.2 Active Moloch
172.67.146.82 Active Moloch

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
suspicious_features POST method with no referer header suspicious_request POST http://fixz5sb.top/v1/upload.php
request POST http://fixz5sb.top/v1/upload.php
request POST http://fixz5sb.top/v1/upload.php
domain fixz5sb.top description Generic top level domain TLD
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73451000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73921000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75bf1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75591000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73bd1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73fa1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x730d1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73401000
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00012000', u'virtual_address': u'0x007ce000', u'entropy': 6.8171981211773005, u'name': u'.reloc', u'virtual_size': u'0x00011e88'} entropy 6.81719812118 description A section with a high entropy has been found
Bkav W32.AIDetectMalware
Elastic malicious (high confidence)
ALYac Generic.Dacic.3471.CF314CA1
VIPRE Generic.Dacic.3471.CF314CA1
K7AntiVirus Password-Stealer ( 0054d1a31 )
BitDefender Generic.Dacic.3471.CF314CA1
K7GW Password-Stealer ( 0054d1a31 )
Cybereason malicious.c8dd6c
Arcabit Trojan.Zusy.D87939
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/PSW.Agent.OGR
APEX Malicious
McAfee Artemis!D9C2521C8DD6
Avast Win32:Evo-gen [Trj]
ClamAV Win.Malware.Barys-10032866-0
MicroWorld-eScan Generic.Dacic.3471.CF314CA1
Rising Stealer.Agent!8.C2 (TFE:5:rLw0cFpN2KM)
Emsisoft Generic.Dacic.3471.CF314CA1 (B)
McAfeeD Real Protect-LS!D9C2521C8DD6
FireEye Generic.Dacic.3471.CF314CA1
Sophos Mal/Generic-S
Google Detected
MAX malware (ai score=87)
Antiy-AVL Trojan[PSW]/Win32.Stealer
Microsoft Trojan:Win32/Cryptnot.QYAA!MTB
GData Generic.Dacic.3471.CF314CA1
Varist W32/Stealer.HD.gen!Eldorado
AhnLab-V3 Infostealer/Win.CryptBot.R659955
BitDefenderTheta Gen:NN.ZexaF.36810.E!Z@aq04k3b
Malwarebytes Spyware.PasswordStealer
Ikarus Trojan-PSW.Agent
Panda Trj/Genetic.gen
huorong TrojanSpy/Stealer.lt
Fortinet W32/Agent.OGR!tr.pws
AVG Win32:Evo-gen [Trj]