Summary | ZeroBOX

Desktop_Explorer.exe

Generic Malware Malicious Library UPX Malicious Packer Anti_VM PE File dll OS Processor Check PE32 DllRegisterServer
Category Machine Started Completed
FILE s1_win7_x6403_us Sept. 20, 2024, 10:33 a.m. Sept. 20, 2024, 10:50 a.m.
Size 10.9MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 acccb5d6308487da88b2f05b2f4f6234
SHA256 f188aaf2e67a048f1cfa0ab7758ac80b0e4a1167042f55176e4ac0d273b26744
CRC32 8DDC8DBA
ssdeep 49152:L8jB0EJgiY3FGXiSLruMH0A0PncurVqhTWQa4IeWKDHIoZcjPeYgjBd0y/ES5TcQ:oF0EJOjA0FrVXgj1lFASTUDHDSNOy
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • DllRegisterServer_Zero - execute regsvr32.exe
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section .symtab
Bkav W32.AIDetectMalware
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of WinGo/TrojanDropper.Agent.EK
Avast Win32:Evo-gen [Trj]
Rising Dropper.Agent!1.10205 (CLASSIC)
Trapmine suspicious.low.ml.score
Google Detected
Microsoft Trojan:Win32/Caynamer.A!ml
AhnLab-V3 Infostealer/Win.LummaC2.C5661024
Ikarus Trojan-Spy.WinGo.Agent
AVG Win32:Evo-gen [Trj]