Summary | ZeroBOX

tdrp.exe

UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 12, 2024, 6:41 p.m. Oct. 12, 2024, 6:47 p.m.
Size 86.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 21b61b3680c5e66f9f7b1f3026327757
SHA256 8de13f64aab532c0bbd3d38cc821ba6fa67ccfadde9cffd14944cc9d85830f4a
CRC32 E8E87BD5
ssdeep 192:MNUGDWCn+rYeumelDB2JkknJxTqth7cccccccccccccccccccccccccccccccccA:AU5C+rU9lDAJnuz
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
125.253.92.50 Active Moloch
185.215.113.66 Active Moloch

suspicious_features Connection to IP address suspicious_request GET http://185.215.113.66/tdrpl.exe
request GET http://185.215.113.66/tdrpl.exe
file C:\Users\test22\AppData\Local\Temp\19279.scr
Time & API Arguments Status Return Repeated

recv

buffer: HTTP/1.1 200 OK Server: nginx/1.18.0 (Ubuntu) Date: Sat, 12 Oct 2024 09:45:07 GMT Content-Type: application/octet-stream Content-Length: 98304 Last-Modified: Sat, 05 Oct 2024 04:09:03 GMT Connection: keep-alive ETag: "6700bbdf-18000" Accept-Ranges: bytes MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $m»pj)Ú9)Ú9)Ú9 ¢”9.Ú9Q¨8+Ú9êÕC9+Ú9êÕA9(Ú9êÕ9+Ú9s9-Ú9)Ú9•Ú9e9<Ú9 ¢9-Ú9 ¢š95Ú9 ¢9(Ú9Rich)Ú9PEL»gà  î @y@ |0.text†íî `.rdataò?@ò@@.dataH_@N2@À
received: 1024
socket: 712
1 1024 0
host 125.253.92.50
host 185.215.113.66
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.CliptoShuffler.7!c
Cynet Malicious (score: 99)
CAT-QuickHeal Trojan.Cliptoshuffler
Skyhigh Artemis!Trojan
ALYac Gen:Variant.Lazy.208919
VIPRE Gen:Variant.Lazy.208919
BitDefender Gen:Variant.Lazy.208919
K7GW Trojan-Downloader ( 005bb7791 )
K7AntiVirus Trojan-Downloader ( 005bb7791 )
Arcabit Trojan.Lazy.D33017
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/TrojanDownloader.Phorpiex.C
APEX Malicious
Avast Win32:Evo-gen [Trj]
Kaspersky HEUR:Trojan-Banker.Win32.CliptoShuffler.gen
Alibaba TrojanBanker:Win32/CliptoShuffler.372ca747
MicroWorld-eScan Gen:Variant.Lazy.208919
Rising Downloader.Phorpiex!8.D8CF (CLOUD)
Emsisoft Gen:Variant.Lazy.208919 (B)
F-Secure Heuristic.HEUR/AGEN.1315823
DrWeb Trojan.Siggen29.49095
McAfeeD ti!8DE13F64AAB5
CTX exe.trojan.agen
Sophos Mal/Generic-S
FireEye Generic.mg.21b61b3680c5e66f
Webroot W32.Trojan.Gen
Google Detected
Avira HEUR/AGEN.1315823
Antiy-AVL Trojan[Banker]/Win32.CliptoShuffler
Kingsoft malware.kb.a.1000
Gridinsoft Ransom.Win32.Wacatac.sa
Microsoft Trojan:Win32/Phorpiex
ZoneAlarm HEUR:Trojan-Banker.Win32.CliptoShuffler.gen
GData Gen:Variant.Lazy.208919
Varist W32/ABTrojan.QLHS-7865
AhnLab-V3 Downloader/Win.Generic.C5680675
McAfee PWS-FCEQ!21B61B3680C5
DeepInstinct MALICIOUS
VBA32 suspected of Trojan.Downloader.gen
Malwarebytes Trojan.Downloader
Ikarus Trojan-Downloader.Win32.Phorpiex
Panda Trj/Chgt.AD
TrendMicro-HouseCall TROJ_GEN.R002H09J924
Tencent Win32.Trojan-Banker.Cliptoshuffler.Wdkl
Fortinet PossibleThreat.MU
AVG Win32:Evo-gen [Trj]
Paloalto generic.ml
alibabacloud Trojan[stealer]:Win/Phorpiex.C