Summary | ZeroBOX

bybit.exe

Generic Malware Malicious Library UPX Malicious Packer PE File dll OS Processor Check PE32 DllRegisterServer
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 14, 2024, 10:37 a.m. Oct. 14, 2024, 10:44 a.m.
Size 13.3MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 17b81f863b1cb9fa2ba7b1d78b6039f5
SHA256 8e74dad0ba6445fd3417cd79fc43dd8c367e2bdf3d8125130d08770e1b184959
CRC32 17E67F28
ssdeep 98304:7H6PkG0LOdKv7q+oM1zRi+xJimPTF1DO/h6TcX84:KklHdoMzUF6TTO9
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • DllRegisterServer_Zero - execute regsvr32.exe
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section .symtab
Bkav W32.AIDetectMalware
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of WinGo/TrojanDropper.Agent.ES
Avast Win32:Evo-gen [Trj]
Rising Dropper.Agent!1.10205 (CLASSIC)
Trapmine malicious.moderate.ml.score
Sophos Troj/Inject-JQY
Google Detected
Microsoft Trojan:Win64/LummaStealer.VM!MTB
AhnLab-V3 Infostealer/Win.CryptBot.C5667336
VBA32 Dropper.Wingo.Heur
Ikarus Trojan-Spy.LummaStealer
AVG Win32:Evo-gen [Trj]