Summary | ZeroBOX

CarZ.exe

Emotet Generic Malware Malicious Library UPX PE File OS Processor Check PE32
    Category Machine Started Completed
    FILE s1_win7_x6401 April 10, 2025, 1:45 a.m. April 10, 2025, 1:45 a.m.
    Size 774.0KB
    Type PE32 executable (GUI) Intel 80386, for MS Windows
    MD5 33a2df57afcf0e90607ab3a604ab6939
    SHA256 a4bb293acebb8e22484f1f2142d5cc025e96042402af0e7e21888363395d4e29
    CRC32 ACD48C61
    ssdeep 12288:XE3vjg9hzSj/VVbVESEqTgaoUzqlfhFdMLm3s+Evz8fFG0YgTH3Fw5:ULgzSRVmStDoUzqlr0Z/z8F8
    Yara
    • PE_Header_Zero - PE File Signature
    • Malicious_Library_Zero - Malicious_Library
    • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
    • IsPE32 - (no description)
    • Generic_Malware_Zero - Generic Malware
    • OS_Processor_Check_Zero - OS Processor Check
    • UPX_Zero - UPX packed file

    Name Response Post-Analysis Lookup
    No hosts contacted.
    IP Address Status Action
    No hosts contacted.

    Suricata Alerts

    No Suricata Alerts

    Suricata TLS

    No Suricata TLS

    section .data1
    section .bind
    Bkav W32.AIDetectMalware
    Cynet Malicious (score: 100)
    Cylance Unsafe
    CrowdStrike win/malicious_confidence_70% (D)
    McAfeeD ti!A4BB293ACEBB
    Kingsoft malware.kb.a.880
    VBA32 BScope.Trojan.Sabsik.FL
    Time & API Arguments Status Return Repeated

    NtProtectVirtualMemory

    process_identifier: 2560
    stack_dep_bypass: 0
    stack_pivoted: 0
    heap_dep_bypass: 1
    length: 114688
    protection: 32 (PAGE_EXECUTE_READ)
    base_address: 0x10001000
    process_handle: 0xffffffff
    1 0 0
    section {u'size_of_data': u'0x0002d7d0', u'virtual_address': u'0x00107000', u'entropy': 7.9770450263203685, u'name': u'.bind', u'virtual_size': u'0x0002d7d0'} entropy 7.97704502632 description A section with a high entropy has been found
    entropy 0.23631714593 description Overall entropy of this PE file is high