Summary | ZeroBOX

dkasjhajksdhdjkas.exe

Generic Malware Malicious Library UPX ftp PE64 PE File OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6401 Nov. 13, 2024, 1:56 p.m. Nov. 13, 2024, 2:12 p.m.
Size 4.5MB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 09e252478ab23c7c677a2765234335bd
SHA256 abc35b74a68a91f2a6640467e6eedcac02f7ffb02bac14b196deda5cb63070b6
CRC32 842AAF1B
ssdeep 98304:miV01Ssm1ttYbODo4CyZwg562/K5a6e6c8hDkDe9ncT40Dfv:miiyZYkoryEJg6cXs0Dfv
PDB Path D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Revendedores Painel\Spectre Joao\HVCI VALORANT\AIM\x64\Release\Google Chrome.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • ftp_command - ftp command
  • IsPE64 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Revendedores Painel\Spectre Joao\HVCI VALORANT\AIM\x64\Release\Google Chrome.pdb
section {u'size_of_data': u'0x002fd600', u'virtual_address': u'0x00176000', u'entropy': 7.970910719440925, u'name': u'.data', u'virtual_size': u'0x002fe8c0'} entropy 7.97091071944 description A section with a high entropy has been found
entropy 0.664676508901 description Overall entropy of this PE file is high
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.GameHack.4!c
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win64.Dropper.rc
ALYac Gen:Variant.Lazy.457518
Cylance Unsafe
VIPRE Gen:Variant.Lazy.457518
CrowdStrike win/malicious_confidence_90% (W)
BitDefender Gen:Variant.Lazy.457518
Arcabit Trojan.Lazy.D6FB2E
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/Riskware.GameHack.AK
APEX Malicious
Avast FileRepMalware [Misc]
Kaspersky UDS:DangerousObject.Multi.Generic
MicroWorld-eScan Gen:Variant.Lazy.457518
Rising HackTool.GameHack!8.59E (TFE:5:SSHNpY3d4AU)
Emsisoft Gen:Variant.Lazy.457518 (B)
F-Secure Heuristic.HEUR/AGEN.1371820
McAfeeD ti!ABC35B74A68A
CTX exe.trojan.generic
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Gen:Variant.Lazy.457518
Google Detected
Avira HEUR/AGEN.1371820
Antiy-AVL Trojan/Win32.Sabsik
Kingsoft Win32.Troj.Unknown.a
Gridinsoft Ransom.Win64.Sabsik.sa
Microsoft Trojan:Win32/Wacatac.A!ml
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Gen:Variant.Lazy.457518
Varist W64/Agent.IDJ.gen!Eldorado
AhnLab-V3 Trojan/Win.Lazy.R674221
Acronis suspicious
McAfee Artemis!09E252478AB2
DeepInstinct MALICIOUS
Ikarus Trojan.Win32.Generic
Panda Trj/Chgt.AD
Tencent Malware.Win32.Gencirc.141fa305
Yandex Riskware.GameHack!Hl6ZuIWXMG0
MaxSecure Trojan.Malware.1728101.susgen
Fortinet W64/GenKryptik.GHEK!tr
AVG FileRepMalware [Misc]
Paloalto generic.ml