Summary | ZeroBOX

po_6645.cab

Category Machine Started Completed
FILE s1_win7_x6401 March 9, 2021, 1:37 p.m. March 9, 2021, 1:39 p.m.
Size 26.0KB
Type Microsoft Cabinet archive data, 26644 bytes, 1 file
MD5 35d478c0fce6a6188acd87c600790615
SHA256 bcc03fb5fc7f486225241b6acdda480cdf7f7c27137cf56d75e7f3d07bcb0572
CRC32 A20D475A
ssdeep 768:1YAUnbEKgCWyrpKOziCi1qk/pT20ILgvu:1Ibzr5ikaTSLgvu
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

description Code injection with CreateRemoteThread in a remote process rule inject_thread
description Create a windows service rule create_service
description Create a COM server rule create_com_service
description Communications over UDP network rule network_udp_sock
description Listen for incoming communication rule network_tcp_listen
description Communications over P2P network rule network_p2p_win
description Communications over HTTP rule network_http
description File downloader/dropper rule network_dropper
description Communications over FTP rule network_ftp
description Communications over RAW socket rule network_tcp_socket
description Communications use DNS rule network_dns
description Communication using dga rule network_dga
description Escalade priviledges rule escalate_priv
description Take screenshot rule screenshot
description Run a keylogger rule keylogger
description Steal credential rule cred_local
description Record Audio rule sniff_audio
description APC queue tasks migration rule migrate_apc
description Malware can spread east-west file rule spreading_file
description Malware can spread east-west using share drive rule spreading_share
description Create or check mutex rule win_mutex
description Affect system registries rule win_registry
description Affect system token rule win_token
description Affect private profile rule win_private_profile
description Affect private profile rule win_files_operation
description Match Winsock 2 API library declaration rule Str_Win32_Winsock2_Library
description Match Windows Inet API library declaration rule Str_Win32_Wininet_Library
description Match Windows Inet API call rule Str_Win32_Internet_API
description Match Windows Http API call rule Str_Win32_Http_API
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
McAfee Artemis!F0246040C945
Malwarebytes Generic.Malware/Suspicious
Sangfor Trojan.Win32.Save.a
Cyren CAB/Trojan.XYDD-6
Cynet Malicious (score: 85)
AegisLab Trojan.Multi.Generic.4!c
F-Secure Trojan.TR/AD.VBCryptor.cnzao
McAfee-GW-Edition BehavesLike.Fareit.mc
Sophos Mal/DrodCab-A
SentinelOne Static AI - Suspicious Archive
Avira TR/AD.VBCryptor.cnzao
Microsoft Trojan:Win32/Bomitag.D!ml
GData Win32.Trojan-Downloader.GuLoader.3B6FP8
AhnLab-V3 Win-Trojan/VBKrand.Gen
BitDefenderTheta Gen:NN.ZevbaF.34608.hm0@aKEP!Ghi
Ikarus Win32.Outbreak
Panda Trj/RnkBend.A