Summary | ZeroBOX

main.exe

Hide_EXE Malicious Library UPX Malicious Packer PE File PE32
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 11, 2024, 9:38 a.m. Nov. 11, 2024, 9:44 a.m.
Size 1.9MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 4054233ef6205f36c696ab115691a830
SHA256 5df1541ad60ef41fc8f0b873c3ee05031b3d1a2320b13a56ba516b909989cf4c
CRC32 DD35094E
ssdeep 24576:CG95TieVuBiRRnw6ECtFh1PLezR4LQmE4uda0E5j61D4ZUdayXYB4PeKgoGJCswf:CURasrIYEC/BFWzz9
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • hide_executable_file - Hide executable file
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section .symtab
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.esp: 1637676
registers.edi: 4423344
registers.eax: 0
registers.ebp: 1637680
registers.edx: 4294967295
registers.ebx: 1637692
registers.esi: 1637608
registers.ecx: 0
1 0 0
section {u'size_of_data': u'0x0001d800', u'virtual_address': u'0x00175000', u'entropy': 7.99463004116742, u'name': u'/19', u'virtual_size': u'0x0001d76e'} entropy 7.99463004117 description A section with a high entropy has been found
section {u'size_of_data': u'0x00005400', u'virtual_address': u'0x00193000', u'entropy': 7.96778592163847, u'name': u'/32', u'virtual_size': u'0x00005366'} entropy 7.96778592164 description A section with a high entropy has been found
section {u'size_of_data': u'0x00035e00', u'virtual_address': u'0x0019a000', u'entropy': 7.997611321799765, u'name': u'/65', u'virtual_size': u'0x00035d39'} entropy 7.9976113218 description A section with a high entropy has been found
section {u'size_of_data': u'0x0001a200', u'virtual_address': u'0x001d0000', u'entropy': 7.9942079675095155, u'name': u'/78', u'virtual_size': u'0x0001a1eb'} entropy 7.99420796751 description A section with a high entropy has been found
section {u'size_of_data': u'0x0000a400', u'virtual_address': u'0x001eb000', u'entropy': 7.893946393382329, u'name': u'/90', u'virtual_size': u'0x0000a334'} entropy 7.89394639338 description A section with a high entropy has been found
entropy 0.260552371027 description Overall entropy of this PE file is high
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.m!c
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win32.Generic.th
ALYac Trojan.GenericKD.74706461
Cylance Unsafe
VIPRE Trojan.GenericKD.74706461
CrowdStrike win/malicious_confidence_90% (W)
BitDefender Trojan.GenericKD.74706461
K7GW Trojan ( 0058f29c1 )
K7AntiVirus Trojan ( 0058f29c1 )
Arcabit Trojan.Generic.D473EE1D
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of WinGo/Kryptik.AA
APEX Malicious
Avast Win32:Malware-gen
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Backdoor:Win32/Kryptik.011d20d9
MicroWorld-eScan Trojan.GenericKD.74706461
Emsisoft Trojan.GenericKD.74706461 (B)
F-Secure Trojan.TR/Crypt.XPACK.Gen
McAfeeD Real Protect-LS!4054233EF620
CTX exe.trojan.kryptik
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Trojan.GenericKD.74706461
Google Detected
Avira TR/Crypt.XPACK.Gen
Antiy-AVL GrayWare/Win32.Wacapew
Kingsoft Win32.Hack.Generic.a
Gridinsoft Trojan.Win32.Kryptik.sa
Xcitium Malware@#2ewxjcfi75uez
Microsoft Trojan:Win32/Farfli!rfn
ZoneAlarm HEUR:Backdoor.Win32.Generic
GData Trojan.GenericKD.74706461
Varist W32/ABTrojan.ASCB-2347
AhnLab-V3 Trojan/Win.Generic.C5691646
McAfee Artemis!4054233EF620
DeepInstinct MALICIOUS
VBA32 BScope.Trojan.SvcHorse.01643
Malwarebytes Malware.AI.4118751556
Ikarus Trojan.WinGo.Crypt
Panda Trj/Chgt.AD
Tencent Win32.Backdoor.Generic.Iajl
huorong TrojanDownloader/Agent.afc
MaxSecure Trojan.Malware.1728101.susgen
Fortinet W32/Kryptik.AA!tr
AVG Win32:Malware-gen
Paloalto generic.ml