Summary | ZeroBOX

66f3de8e8f1c5_lyla334.exe#lyla

Generic Malware Malicious Library UPX PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 26, 2024, 12:05 p.m. Sept. 26, 2024, 12:12 p.m.
Size 408.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 51636e7775782f91df225f511b297f96
SHA256 07439f8a2adbe031b3b1f4bca85a8f8e99dfac6499ec6f9261d3c01d7a744bb6
CRC32 3D211CB5
ssdeep 6144:D4SOx32ux+Zzo97tIDEjTI3+bOFNnPDqbc3Io/LTJWXvbMvquO52T3:BOxLx+Zk9paHNPDqbdo/LdWfbMCuYA
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

resource name ZAVUTIDORAMACE
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2572
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 180224
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0261e000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2572
region_size: 45056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00320000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00030000', u'virtual_address': u'0x00011000', u'entropy': 7.887757118278017, u'name': u'.rdata', u'virtual_size': u'0x0002ff88'} entropy 7.88775711828 description A section with a high entropy has been found
entropy 0.471165644172 description Overall entropy of this PE file is high
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
tehtris Generic.Malware
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win32.Lockbit.gh
Cylance Unsafe
Sangfor Ransom.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (D)
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Kryptik.HXYG
APEX Malicious
Avast Win32:BotX-gen [Trj]
ClamAV Win.Packer.pkr_ce1a-9980177-0
Rising Malware.Obscure!1.A3BB (CLASSIC)
TrendMicro Trojan.Win32.PRIVATELOADER.YXEIYZ
McAfeeD ti!07439F8A2ADB
Trapmine malicious.moderate.ml.score
CTX exe.trojan.generic
Sophos Troj/Krypt-VK
SentinelOne Static AI - Suspicious PE
FireEye Generic.mg.51636e7775782f91
Webroot W32.Trojan.Gen
Google Detected
Antiy-AVL Trojan/Generic.ASMalwIH.F0BF
Kingsoft malware.kb.a.1000
Gridinsoft Trojan.Win32.SmokeLoader.tr
Microsoft Trojan:Win32/Leonem
GData Win32.Trojan-Downloader.SmokeLoader.BT1QFV
Varist W32/Kryptik.MIZ.gen!Eldorado
AhnLab-V3 Infostealer/Win.SmokeLoader.C5674601
McAfee Artemis!51636E777578
DeepInstinct MALICIOUS
VBA32 Trojan.Buzus
Malwarebytes Trojan.MalPack.GS
Ikarus Trojan.Win32.Crypt
Panda Trj/Chgt.AD
TrendMicro-HouseCall Trojan.Win32.PRIVATELOADER.YXEIYZ
Tencent Trojan.Win32.Obfuscated.gen
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/PossibleThreat
AVG Win32:BotX-gen [Trj]
Paloalto generic.ml
alibabacloud Backdoor:Win/Leonem.Gen