Summary | ZeroBOX

FULL_OPTION.exe

Generic Malware Malicious Library Antivirus UPX Malicious Packer Anti_VM ftp PE File PE64 OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 14, 2024, 10:35 a.m. Oct. 14, 2024, 10:51 a.m.
Size 3.8MB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 1dcdd77ba8afe481b4af754876f70ee8
SHA256 e5f2c31e3b741665821670118a78692cd1f44a349ad20007c0628fa3fb307734
CRC32 29C8F3BE
ssdeep 49152:akB2fm0tI2+vb67PeDV/jVuoMLBXVn/oPD2I0F1QSO23dwoQB1cBYATrxl0Amtfy:akB2l2vO7yqLu2nF1QSbtwPalNl0Da
PDB Path D:\ALLLLREALSHY\src\สำหรับสายเดิมพัน Bet\SBAGGY2\SBAGGY\examples\example_win32_directx11\Build\example_win32_directx11.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • ftp_command - ftp command
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE64 - (no description)
  • Antivirus - Contains references to security software
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
163.172.154.142 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path D:\ALLLLREALSHY\src\สำหรับสายเดิมพัน Bet\SBAGGY2\SBAGGY\examples\example_win32_directx11\Build\example_win32_directx11.pdb
section {u'size_of_data': u'0x00212c00', u'virtual_address': u'0x001a1000', u'entropy': 7.838417300983439, u'name': u'.data', u'virtual_size': u'0x00215ff0'} entropy 7.83841730098 description A section with a high entropy has been found
section {u'size_of_data': u'0x00006a00', u'virtual_address': u'0x003c5000', u'entropy': 7.90703358679134, u'name': u'.rsrc', u'virtual_size': u'0x0000688c'} entropy 7.90703358679 description A section with a high entropy has been found
entropy 0.555354605348 description Overall entropy of this PE file is high
host 163.172.154.142
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.CryptInject.4!c
Cynet Malicious (score: 99)
Skyhigh BehavesLike.Win64.Dropper.wc
ALYac Gen:Variant.Lazy.589596
Cylance Unsafe
VIPRE Gen:Variant.Lazy.589596
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_90% (D)
BitDefender Gen:Variant.Lazy.589596
K7GW Trojan ( 005b5bc11 )
K7AntiVirus Trojan ( 005b5bc11 )
Arcabit Trojan.Lazy.D8FF1C
VirIT Trojan.Win64.Agent.HGU
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/Riskware.GameHack.AK
APEX Malicious
Avast FileRepMalware [Misc]
Alibaba Trojan:Win64/CryptInject.306cd659
MicroWorld-eScan Gen:Variant.Lazy.589596
Rising Trojan.CryptInject!8.F425 (TFE:5:WJNQcxlHECC)
Emsisoft Gen:Variant.Lazy.589596 (B)
F-Secure Trojan.TR/Inject.iyaon
Zillya Tool.GameHack.Win64.2759
TrendMicro TROJ_GEN.R002C0DH124
McAfeeD ti!E5F2C31E3B74
CTX exe.trojan.cryptinject
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Gen:Variant.Lazy.589596
Jiangmin Trojan.Lazy.l
Google Detected
Avira TR/Inject.iyaon
Antiy-AVL RiskWare/Win64.Gamehack
Microsoft Trojan:Win64/CryptInject.SIC!MTB
GData Gen:Variant.Lazy.589596
AhnLab-V3 Trojan/Win.CryptInject.R657191
McAfee Artemis!1DCDD77BA8AF
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.278309588
Ikarus Trojan.Win64.Krypt
Panda Trj/GdSda.A
TrendMicro-HouseCall TROJ_GEN.R002C0DH124
Tencent Trojan-DL.Win64.Agent.16001227
Yandex Riskware.GameHack!bqHqymS2NRc
MaxSecure Trojan.Malware.204820417.susgen
Fortinet W64/GenKryptik.GHEK!tr
AVG FileRepMalware [Misc]
Paloalto generic.ml