Summary | ZeroBOX

djksahjkdhkh.exe

Generic Malware Malicious Library UPX ftp PE64 PE File OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 13, 2024, 1:56 p.m. Nov. 13, 2024, 2:06 p.m.
Size 4.5MB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 bb90600c0a9be0cb52202b5ebf95c5cc
SHA256 bc23dc2a555f56be059cb588f37bf5b4067935491775e43dfb782599828e8701
CRC32 1D5364BC
ssdeep 98304:PmiwqOVm5ttYOpDo4CyZwg562/K5a6e6c8hDkDe9ncT40Dfv:Pmve1YooryEJg6cXs0Dfv
PDB Path D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Revendedores Painel\Spectre Joao\HVCI VALORANT\ESP\x64\Release\Google Chrome.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • ftp_command - ftp command
  • IsPE64 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Revendedores Painel\Spectre Joao\HVCI VALORANT\ESP\x64\Release\Google Chrome.pdb
section {u'size_of_data': u'0x002fd200', u'virtual_address': u'0x00174000', u'entropy': 7.971199512421416, u'name': u'.data', u'virtual_size': u'0x002fe4c0'} entropy 7.97119951242 description A section with a high entropy has been found
entropy 0.665760278442 description Overall entropy of this PE file is high
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win64.Dropper.rc
ALYac Gen:Variant.Lazy.457518
Cylance Unsafe
VIPRE Gen:Variant.Lazy.457518
CrowdStrike win/malicious_confidence_90% (W)
BitDefender Gen:Variant.Lazy.457518
K7GW Trojan ( 005b5b891 )
K7AntiVirus Trojan ( 005b5b891 )
Arcabit Trojan.Lazy.D6FB2E
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/Riskware.GameHack.AK
APEX Malicious
Avast FileRepMalware [Misc]
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Trojan:Win64/Generic.1735f27b
MicroWorld-eScan Gen:Variant.Lazy.457518
Rising Trojan.Lazy!8.8EC3 (CLOUD)
Emsisoft Gen:Variant.Lazy.457518 (B)
F-Secure Heuristic.HEUR/AGEN.1371818
McAfeeD ti!BC23DC2A555F
CTX exe.trojan.lazy
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Gen:Variant.Lazy.457518
Google Detected
Avira HEUR/AGEN.1371818
Antiy-AVL Trojan/Win64.Lazy
Kingsoft Win32.Troj.Unknown.a
Gridinsoft Trojan.Win64.Downloader.sa
Microsoft Trojan:Win64/Lazy.CN!MTB
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Gen:Variant.Lazy.457518
Varist W64/Agent.IDJ.gen!Eldorado
AhnLab-V3 Trojan/Win.Lazy.R674221
Acronis suspicious
McAfee Artemis!BB90600C0A9B
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.299982594
Ikarus Trojan.Win32.Generic
Panda Trj/GdSda.A
Tencent Malware.Win32.Gencirc.141fa276
MaxSecure Trojan.Malware.1728101.susgen
Fortinet W64/GenKryptik.GHEK!tr
AVG FileRepMalware [Misc]
Paloalto generic.ml