Summary | ZeroBOX

KeyActivation-GLEO.FUN.lnk

Generic Malware Antivirus GIF Format Lnk Format
Category Machine Started Completed
FILE s1_win7_x6401 April 2, 2025, 9:45 a.m. April 2, 2025, 9:47 a.m.
Size 2.4KB
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Wed Feb 5 04:09:11 2025, mtime=Sun Mar 16 20:50:37 2025, atime=Wed Feb 5 04:09:11 2025, length=1040384, window=hide
MD5 d6c471d75a7d9e707349988639f9aa69
SHA256 deb98936aad91a2805108a839ad5083a043efa1045dd92869d7a00036bcd771a
CRC32 3E7A3369
ssdeep 48:8kryrp1OkZP66L7T8r39bILvvalLq+ucU:8kryrp1x66L7or39b2Iq+6
Yara
  • Antivirus - Contains references to security software
  • lnk_file_format - Microsoft Windows Shortcut File Format
  • Lnk_Format_Zero - LNK Format
  • Generic_Malware_Zero - Generic Malware

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: The system cannot find the file C:\Users\test22\AppData\Local\Temp\KeyActivation-GLEO.FUN.lnk.
console_handle: 0x0000000b
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2540
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72c22000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b90000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\KeyActivation-GLEO.FUN.lnk
Symantec Scr.Malcode!gen
ESET-NOD32 a variant of Generik.QUSDUP
TrendMicro-HouseCall HEUR_LNKEXEC.A
Avast LNK:Agent-LC [Drp]
Kaspersky HEUR:Trojan.WinLNK.Agent.gen
DrWeb LNK.Downloader.676
TrendMicro HEUR_LNKEXEC.A
GData Win32.Trojan.Agent.IRT633
Tencent Win32.Trojan.Agent.Jmnw
Fortinet LNK/Agent.LC!tr
AVG LNK:Agent-LC [Drp]
alibabacloud Trojan:Win/Agent.gyf