Summary | ZeroBOX

DevMI.exe

Generic Malware PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Feb. 5, 2025, 11:02 a.m. Feb. 5, 2025, 11:24 a.m.
Size 5.8MB
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 5f2f1ae240812065799e8c05d3a01aa7
SHA256 adad69d9a6bf24c7739cc25cf4def1b96d05accc349ed86e9200d404c039ad03
CRC32 7FEA0238
ssdeep 98304:nFgc9lwquOMw7CRBgZXLzpYyAVIAPs0yFPJ+m0gfEOIdVZZMxy9/qbnbWYwhgI2Z:n2O6qLMwQKZXLzcqAPs08PJ+m0kEOIzi
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • Generic_Malware_Zero - Generic Malware

IP Address Status Action
146.59.154.106 Active Moloch
164.124.101.2 Active Moloch

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.103:52760 -> 164.124.101.2:53 2033268 ET POLICY Observed DNS Query to Coin Mining Domain (nanopool .org) Potential Corporate Privacy Violation

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.103:49162
146.59.154.106:14433
None None None

Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 316
region_size: 159744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000670000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0
section {u'size_of_data': u'0x00595c00', u'virtual_address': u'0x00022000', u'entropy': 7.70825305503083, u'name': u'.data', u'virtual_size': u'0x00595c00'} entropy 7.70825305503 description A section with a high entropy has been found
entropy 0.970720529577 description Overall entropy of this PE file is high
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Reflo.4!c
Cynet Malicious (score: 100)
CAT-QuickHeal Trojan.Ghanarava.1732713348a01aa7
Skyhigh Artemis!Trojan
Cylance Unsafe
VIPRE Gen:Heur.Whisperer.1.0000004000
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Gen:Heur.Whisperer.1.0000004000
K7GW Trojan ( 005a508c1 )
K7AntiVirus Trojan ( 005a508c1 )
Arcabit Trojan.Whisperer.1.0000004000
VirIT Trojan.Win32.GenusB.DGFE
Symantec Trojan Horse
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/TrojanDropper.Agent.IH
APEX Malicious
Avast Win64:CrypterX-gen [Trj]
ClamAV Win.Packed.Tedy-10005655-0
Kaspersky HEUR:Trojan.Win64.Reflo.pef
Alibaba TrojanDropper:Win64/Xmrig.7823356b
MicroWorld-eScan Gen:Heur.Whisperer.1.0000004000
Rising Trojan.Kryptik!8.8 (TFE:5:tSjl4DNY5BP)
Emsisoft Gen:Heur.Whisperer.1.0000004000 (B)
F-Secure Heuristic.HEUR/AGEN.1372811
DrWeb Trojan.PWS.Siggen3.24856
Zillya Trojan.Reflo.Win64.344
TrendMicro TROJ_GEN.R011C0DJ424
McAfeeD ti!ADAD69D9A6BF
CTX exe.trojan.reflo
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Gen:Heur.Whisperer.1.0000004000
Jiangmin Trojan.Reflo.gf
Google Detected
Avira HEUR/AGEN.1372811
Antiy-AVL Trojan/Win64.GenKryptik
Kingsoft Win64.Trojan.Reflo.pef
Xcitium Malware@#17w52gkpjwpu4
Microsoft Trojan:Win64/Xmrig!MTB
ViRobot Trojan.Win.Z.Tedy.6046008
GData Gen:Heur.Whisperer.1.0000004000
Varist W64/Injector.BMR.gen!Eldorado
AhnLab-V3 Trojan/Win.Generic.R570072
McAfee Artemis!5F2F1AE24081
DeepInstinct MALICIOUS
VBA32 Trojan.Win64.Reflo
Malwarebytes Crypt.Trojan.MSIL.DDS
Ikarus Trojan.Win64.XMRig
Panda Trj/Chgt.AD