Summary | ZeroBOX

TestikBro.exe

Generic Malware Malicious Library Downloader UPX PE64 PE File OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6403_us Aug. 19, 2024, 2 p.m. Aug. 19, 2024, 2:54 p.m.
Size 381.0KB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 7c0a5c2cde620549b93d8372960b63c1
SHA256 3271f49b0f0a89a484b670cf79cd73f57c28cae28a5a3e0c1c6c281c9aaadd71
CRC32 7CDCEF56
ssdeep 6144:YePdowp/FFsk4ff2wZ5Yd3CTqhs1T5CJGi6Axj6KAI281:NowVLX4ff2wsd3BO1TM36AxHAF
Yara
  • Malicious_Library_Zero - Malicious_Library
  • Network_Downloader - File Downloader
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

IP Address Status Action
104.192.140.24 Active Moloch
164.124.101.2 Active Moloch

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
section _RDATA
file C:\Users\test22\AppData\Local\file1.exe
Bkav W64.AIDetectMalware
Elastic malicious (high confidence)
Cylance Unsafe
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win64:DropperX-gen [Drp]
Kaspersky UDS:DangerousObject.Multi.Generic
Rising Downloader.Agent!8.B23 (CLOUD)
McAfeeD ti!3271F49B0F0A
Ikarus Trojan.Win64.Agent
Google Detected
Kingsoft Win32.Troj.Unknown.a
Microsoft Trojan:Win32/Wacatac.B!ml
ZoneAlarm UDS:DangerousObject.Multi.Generic
DeepInstinct MALICIOUS
AVG Win64:DropperX-gen [Drp]
Paloalto generic.ml
CrowdStrike win/malicious_confidence_70% (D)