Summary | ZeroBOX

172373704210952.png.exe

Malicious Packer PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6402 Aug. 20, 2024, 9:47 a.m. Aug. 20, 2024, 9:47 a.m.
Size 399.9KB
Type MS-DOS executable
MD5 e3380ca24bff7803d134ff7bddc81223
SHA256 cf0cdb7290a6637aad0141025ea90332763e69bcada23eec84cf8e81faf53087
CRC32 C7A49402
ssdeep 6144:IqiCOlXQA6cmPd8tf+zzF3a4acxk1ixcSzSoG3EB3wMsQQXwoU:1iCOlXQFIPTcxPxZSoDB3gIoU
Yara
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsDLL - (no description)
  • IsPE64 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Bkav W64.AIDetectMalware
Cynet Malicious (score: 100)
BitDefender Gen:Heur.Mint.Brutel.2
ESET-NOD32 a variant of Win64/Kryptik.EOC
McAfee Artemis!E3380CA24BFF
Kaspersky Backdoor.MSIL.XWorm.bpk
MicroWorld-eScan Gen:Heur.Mint.Brutel.2
Rising Trojan.Kryptik@AI.81 (RDML:CGLsKFIk7hX/vKywDi3HlA)
Emsisoft Gen:Heur.Mint.Brutel.2 (B)
F-Secure Trojan.TR/Kryptik.wzonl
DrWeb Trojan.Loader.2152
TrendMicro Backdoor.Win64.BRUTEL.YXEHPZ
Google Detected
Avira TR/Kryptik.wzonl
MAX malware (ai score=89)
Antiy-AVL Trojan/Win64.Mint
Microsoft Program:Win32/Wacapew.C!ml
ZoneAlarm Backdoor.MSIL.XWorm.bpk
GData Gen:Heur.Mint.Brutel.2
DeepInstinct MALICIOUS
Ikarus Gen.Mint.Brutel
TrendMicro-HouseCall Backdoor.Win64.BRUTEL.YXEHPZ
Tencent Win32.Trojan.FalseSign.Ocnw
Fortinet W64/Mint.BRUTEL!tr