Summary | ZeroBOX

1.jar

ZIP Format
Category Machine Started Completed
FILE s1_win7_x6401 Jan. 30, 2025, 7:31 p.m. Jan. 30, 2025, 7:36 p.m.
Size 739.6KB
Type Zip archive data, at least v2.0 to extract
MD5 3e911add1db29c6820f7d67572cab68a
SHA256 ec3092fa8d97980769eb304ab121e8cc96cd9f4df53f07f8fc2a8730d8864f78
CRC32 558094F7
ssdeep 12288:t4WwQ50ipCI1HgbJCGWBxjVv2HLrnEr83Y5Fu7rEMqNWfxkn56afHK22t2:zwIjgbQbfOrEpGrE1Qxkno0HKJt2
Yara
  • zip_file_format - ZIP file format

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2552
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 2555904
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002560000
process_handle: 0xffffffffffffffff
1 0 0
Lionic Trojan.ZIP.Java.m!c
Skyhigh Artemis!Trojan
ALYac Trojan.Generic.37262608
VIPRE Trojan.Generic.37249169
BitDefender Trojan.Generic.37249169
Arcabit Trojan.Generic.D2386091
Symantec Trojan.Maljava!gen55
ESET-NOD32 multiple detections
Avast Java:Malware-gen [Trj]
Cynet Malicious (score: 99)
Kaspersky HEUR:Backdoor.Java.Adwind.gen
Alibaba Backdoor:JAVA/Adwind.35330cd1
MicroWorld-eScan Trojan.Generic.37249169
Emsisoft Trojan.Generic.37249169 (B)
F-Secure Malware.JAVA/Ratty.wgudn
CTX jar.trojan.java
Ikarus Trojan.Java.Ratty
FireEye Trojan.Generic.37249169
Google Detected
Avira JAVA/Ratty.wgudn
Antiy-AVL Trojan/Java.Ratty
Kingsoft Win32.Troj.Undef.a
Microsoft Trojan:Script/Wacatac.B!ml
GData Java.Trojan.Agent.3IDSS6
Varist ABTrojan.LNBS-
Tencent Java.Backdoor.Adwind.Dwnw
Fortinet Java/Ratty.AH!tr
AVG Java:Malware-gen [Trj]
alibabacloud Backdoor:Java/Ratty.AA
count 2852 name heapspray process java.exe total_mb 713 length 262144 protection PAGE_READWRITE