Summary | ZeroBOX

SoftWall.exe

Generic Malware Malicious Library Downloader UPX Malicious Packer ftp PE64 PE File OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 21, 2024, 5:02 p.m. Oct. 21, 2024, 5:05 p.m.
Size 2.3MB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 f7c9ceb8ad6ca3b2a1e0e264cd3673ae
SHA256 0a34b4983108c1ca1a0da7769d0405a4f2eb0db1f4fc9519ed9966f1d1eea7e4
CRC32 80DF3967
ssdeep 49152:5ZsuOa8IogG/pa4FLIVynGOUkOQcmYDC:pREtIHvVF
PDB Path C:\Users\Private\Documents\DragonBurn-stable\built\DragonBurn.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • Network_Downloader - File Downloader
  • PE_Header_Zero - PE File Signature
  • ftp_command - ftp command
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE64 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\Users\Private\Documents\DragonBurn-stable\built\DragonBurn.pdb
section {u'size_of_data': u'0x000f1600', u'virtual_address': u'0x00145000', u'entropy': 6.880830541382807, u'name': u'.data', u'virtual_size': u'0x000f28b0'} entropy 6.88083054138 description A section with a high entropy has been found
entropy 0.418872017354 description Overall entropy of this PE file is high
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.GameHack.4!c
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win64.Downloader.vh
ALYac Trojan.GenericKD.74237272
Cylance Unsafe
VIPRE Trojan.GenericKD.74237272
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_70% (D)
BitDefender Trojan.GenericKD.74237272
Arcabit Trojan.Generic.D46CC558
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/Riskware.GameHack.AK
APEX Malicious
Avast FileRepMalware [Misc]
Kaspersky UDS:DangerousObject.Multi.Generic
MicroWorld-eScan Trojan.GenericKD.74237272
Rising Hacktool.GameHack!8.59E (CLOUD)
Emsisoft Trojan.GenericKD.74237272 (B)
F-Secure Heuristic.HEUR/AGEN.1371820
Zillya Tool.GameHack.Win64.4338
McAfeeD ti!0A34B4983108
CTX exe.trojan.agen
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Trojan.GenericKD.74237272
Google Detected
Avira HEUR/AGEN.1371820
Antiy-AVL Trojan/Win32.Sabsik
Kingsoft Win32.Troj.Unknown.a
Gridinsoft Ransom.Win64.Sabsik.sa
Microsoft Trojan:Win32/Wacatac.B!ml
GData Trojan.GenericKD.74237272
Varist W64/Agent.IDJ.gen!Eldorado
Acronis suspicious
McAfee Artemis!F7C9CEB8AD6C
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.2090749981
Panda Trj/Chgt.AD
TrendMicro-HouseCall TROJ_GEN.R002H09J624
Tencent Malware.Win32.Gencirc.141dffdb
Fortinet W64/GenKryptik.GHEK!tr
AVG FileRepMalware [Misc]
Paloalto generic.ml