Summary | ZeroBOX

melo.txt.exe

Category Machine Started Completed
FILE s1_win7_x6401 March 19, 2021, 3:13 p.m. March 19, 2021, 3:15 p.m.
Size 32.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 800b215d94cf536173c4debc0ea1e3a0
SHA256 3118708b292765069f61fbdee3214a874a0dff7ab96b5f59d38a200f36d2e106
CRC32 28F88A48
ssdeep 768:FrqQ7AmV3rjBkyo1bXkA8K9CWFwCtwTxf+/ASDz3HUYlyvQ:F33k7jFwvFfwAIDx
Yara
  • PE_Header_Zero - PE File Signature Zero
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • IsPacked - Entropy Check
  • ImportTableIsBad - ImportTable Check
  • FASM - http://flatassembler.net

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section {u'size_of_data': u'0x00008000', u'virtual_address': u'0x00001000', u'entropy': 7.701013601785543, u'name': u'.text', u'virtual_size': u'0x00007ebf'} entropy 7.70101360179 description A section with a high entropy has been found
entropy 1.0 description Overall entropy of this PE file is high
description Code injection with CreateRemoteThread in a remote process rule inject_thread
description Create a windows service rule create_service
description Communications over UDP network rule network_udp_sock
description Listen for incoming communication rule network_tcp_listen
description Communications over P2P network rule network_p2p_win
description Communications over HTTP rule network_http
description File downloader/dropper rule network_dropper
description Communications over FTP rule network_ftp
description Communications over RAW socket rule network_tcp_socket
description Communications use DNS rule network_dns
description Communication using dga rule network_dga
description Escalade priviledges rule escalate_priv
description Take screenshot rule screenshot
description Run a keylogger rule keylogger
description Steal credential rule cred_local
description Record Audio rule sniff_audio
description APC queue tasks migration rule migrate_apc
description Malware can spread east-west using share drive rule spreading_share
description Create or check mutex rule win_mutex
description Affect system registries rule win_registry
description Affect system token rule win_token
description Affect private profile rule win_private_profile
description Affect private profile rule win_files_operation
description Match Winsock 2 API library declaration rule Str_Win32_Winsock2_Library
description Match Windows Inet API library declaration rule Str_Win32_Wininet_Library
description Match Windows Inet API call rule Str_Win32_Internet_API
description Match Windows Http API call rule Str_Win32_Http_API
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
Bkav W32.AIDetect.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Ser.Razy.7042
FireEye Generic.mg.800b215d94cf5361
ALYac Gen:Variant.Ser.Razy.7042
Cylance Unsafe
Zillya Trojan.Generic.Win32.1241921
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (D)
Alibaba TrojanDownloader:Win32/Zurgop.e6862447
K7GW Trojan-Downloader ( 0052c9d61 )
K7AntiVirus Trojan-Downloader ( 0052c9d61 )
BitDefenderTheta AI:Packer.EB5DFF611E
Cyren W32/Dofoil.H.gen!Eldorado
Symantec ML.Attribute.HighConfidence
TrendMicro-HouseCall Trojan.Win32.ZURGOP.SM
Avast Win32:Malware-gen
ClamAV Win.Malware.Razy-7588168-0
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Gen:Variant.Ser.Razy.7042
NANO-Antivirus Trojan.Win32.Zurgop.fednlb
Paloalto generic.ml
Tencent Win32.Trojan.Generic.Dvpj
Ad-Aware Gen:Variant.Ser.Razy.7042
Emsisoft Trojan-Downloader.Zurgop (A)
Comodo Malware@#18lp5b3ss14sy
F-Secure Trojan.TR/Crypt.XPACK.Gen
DrWeb Trojan.PWS.Spy.21017
VIPRE Trojan.Win32.Winwebsec.m (v)
TrendMicro Trojan.Win32.ZURGOP.SM
McAfee-GW-Edition BehavesLike.Win32.VirRansom.nc
Sophos ML/PE-A + Mal/Behav-204
APEX Malicious
Jiangmin Trojan.Generic.cspjr
Avira TR/Crypt.XPACK.Gen
MAX malware (ai score=88)
Microsoft TrojanDownloader:Win32/Dofoil.AD
AegisLab Trojan.Win32.Generic.4!c
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Gen:Variant.Ser.Razy.7042
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.Dofoil.R223509
Acronis suspicious
McAfee GenericRXGK-YC!800B215D94CF
VBA32 TScope.Malware-Cryptor.SB
Malwarebytes Trojan.Agent
Ikarus Trojan-Downloader.Win32.Dofoil
ESET-NOD32 a variant of Win32/Smokeloader.J
Rising Downloader.Zurgop!8.4BB (CLOUD)
Yandex Trojan.Agent!d96018NE7Ww