Summary | ZeroBOX

poetsaw.exe

Generic Malware .NET framework(MSIL) Malicious Library UPX Malicious Packer PE File PE32 .NET EXE
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 17, 2024, 1:35 p.m. Oct. 17, 2024, 1:39 p.m.
Size 288.5KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 6ce8d30d3af9c62f590e0abd2d719a64
SHA256 8e9865e156c3ac9da2f51eb35cfebaa45d7cb9165d9a13c8a92ff0bccde25eed
CRC32 E671B097
ssdeep 6144:e7zO0LSclT6FOwEP5Kq+SMv0VGb7bDcllbkrn:clJtTF9zVGkllbkb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • Is_DotNET_EXE - (no description)
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
ip-api.com 208.95.112.1
IP Address Status Action
164.124.101.2 Active Moloch
208.95.112.1 Active Moloch
45.120.178.138 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49163 -> 208.95.112.1:80 2036383 ET MALWARE Common RAT Connectivity Check Observed A Network Trojan was detected
TCP 192.168.56.103:49163 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected
UDP 192.168.56.103:52760 -> 164.124.101.2:53 2054141 ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) Device Retrieving External IP Address Detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: SUCCESS: The scheduled task "NET framework" has successfully been created.
console_handle: 0x00000007
1 1 0
request GET http://ip-api.com/json/
domain ip-api.com
host 45.120.178.138
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Quasar.m!c
CAT-QuickHeal Backdoor.MsilFC.S6050939
Skyhigh BehavesLike.Win32.Generic.dh
Cylance Unsafe
VIPRE Gen:Heur.Ransom.Imps.3
CrowdStrike win/malicious_confidence_100% (D)
BitDefender Gen:Heur.Ransom.Imps.3
K7GW Trojan ( 00562f821 )
K7AntiVirus Trojan ( 00562f821 )
Arcabit Trojan.Ransom.Imps.3
VirIT Backdoor.Win32.Quasar.AM
Symantec ML.Attribute.HighConfidence
Elastic Windows.Trojan.Quasarrat
ESET-NOD32 a variant of MSIL/Spy.Agent.AES
APEX Malicious
Avast MSIL:Rat-B [Trj]
ClamAV Win.Trojan.Barys-1
Kaspersky HEUR:Backdoor.MSIL.Quasar.gen
Alibaba Backdoor:MSIL/Quasar.b9080902
NANO-Antivirus Trojan.Win32.PWS.edqjme
MicroWorld-eScan Gen:Heur.Ransom.Imps.3
Rising Backdoor.xRAT!1.E17E (CLASSIC)
Emsisoft Gen:Heur.Ransom.Imps.3 (B)
F-Secure Heuristic.HEUR/AGEN.1307329
DrWeb BackDoor.Quasar.1
Zillya Trojan.Agent.Win32.4005592
TrendMicro TSPY_TINCLEX.SM1
McAfeeD Real Protect-LS!6CE8D30D3AF9
Trapmine suspicious.low.ml.score
CTX exe.ransomware.imps
Sophos ATK/Zaquar-D
SentinelOne Static AI - Malicious PE
FireEye Generic.mg.6ce8d30d3af9c62f
Jiangmin Backdoor.MSIL.acwb
Webroot W32.Trojan.Gen
Google Detected
Avira HEUR/AGEN.1307329
Antiy-AVL Trojan[Spy]/Win32.Agent.foqx
Kingsoft MSIL.Backdoor.Quasar.gen
Gridinsoft Trojan.Win32.Agent.sa
Microsoft Backdoor:Win32/QuasarRAT.A
ZoneAlarm HEUR:Backdoor.MSIL.Quasar.gen
GData MSIL.Backdoor.Quasar.D
Varist W32/MSIL_Mintluks.A.gen!Eldorado
AhnLab-V3 Trojan/Win.Subti.R414075
McAfee GenericRXDY-OW!6CE8D30D3AF9
TACHYON Trojan/W32.DN-Agent.295424.M
DeepInstinct MALICIOUS
VBA32 Trojan.MSIL.Quasar.Heur