Windows
Analysis Report
Nezur.zip
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
7zG.exe (PID: 1780 cmdline:
"C:\Progra m Files\7- Zip\7zG.ex e" x -o"C: \Users\use r\Download s\mGYRbZUh oR\Nezur\" -ad -an - ai#7zMap13 722:94:7zE vent29886 MD5: 50F289DF0C19484E970849AAC4E6F977)
cmd.exe (PID: 4336 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Dow nloads\mGY RbZUhoR\Ne zur\start. bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 4356 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cacls.exe (PID: 5712 cmdline:
C:\Windows \system32\ cacls.exe" "C:\Windo ws\system3 2\config\s ystem MD5: A353590E06C976809F14906746109758) wscript.exe (PID: 2212 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\Temp\ge tadmin.vbs " MD5: A47CBE969EA935BDD3AB568BB126BC80) cmd.exe (PID: 6184 cmdline:
"C:\Window s\System32 \cmd.exe" /c C:\User s\user\DOW NLO~1\MGYR BZ~1\Nezur \start.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 2832 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cacls.exe (PID: 2392 cmdline:
C:\Windows \system32\ cacls.exe" "C:\Windo ws\system3 2\config\s ystem MD5: A353590E06C976809F14906746109758) Nezur.exe (PID: 2704 cmdline:
Nezur.exe auto_load. txt MD5: DD98A43CB27EFD5BCC29EFB23FDD6CA5) conhost.exe (PID: 980 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
cmd.exe (PID: 6236 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Do wnloads\mG YRbZUhoR\N ezur\start .bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 2464 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cacls.exe (PID: 1748 cmdline:
C:\Windows \system32\ cacls.exe" "C:\Windo ws\system3 2\config\s ystem MD5: A353590E06C976809F14906746109758) Nezur.exe (PID: 6392 cmdline:
Nezur.exe auto_load. txt MD5: DD98A43CB27EFD5BCC29EFB23FDD6CA5) conhost.exe (PID: 1300 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
cmd.exe (PID: 4376 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Dow nloads\mGY RbZUhoR\Ne zur\start. bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 6108 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cacls.exe (PID: 1072 cmdline:
C:\Windows \system32\ cacls.exe" "C:\Windo ws\system3 2\config\s ystem MD5: A353590E06C976809F14906746109758) wscript.exe (PID: 4948 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\Temp\ge tadmin.vbs " MD5: A47CBE969EA935BDD3AB568BB126BC80) cmd.exe (PID: 1440 cmdline:
"C:\Window s\System32 \cmd.exe" /c C:\User s\user\DOW NLO~1\MGYR BZ~1\Nezur \start.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 4260 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cacls.exe (PID: 6260 cmdline:
C:\Windows \system32\ cacls.exe" "C:\Windo ws\system3 2\config\s ystem MD5: A353590E06C976809F14906746109758) Nezur.exe (PID: 2780 cmdline:
Nezur.exe auto_load. txt MD5: DD98A43CB27EFD5BCC29EFB23FDD6CA5) conhost.exe (PID: 6004 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
cmd.exe (PID: 7072 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Do wnloads\mG YRbZUhoR\N ezur\start .bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 2920 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cacls.exe (PID: 6104 cmdline:
C:\Windows \system32\ cacls.exe" "C:\Windo ws\system3 2\config\s ystem MD5: A353590E06C976809F14906746109758) Nezur.exe (PID: 5248 cmdline:
Nezur.exe auto_load. txt MD5: DD98A43CB27EFD5BCC29EFB23FDD6CA5) conhost.exe (PID: 5548 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
Nezur.exe (PID: 7152 cmdline:
"C:\Users\ user\Downl oads\mGYRb ZUhoR\Nezu r\Nezur.ex e" C:\User s\user\Dow nloads\mGY RbZUhoR\Ne zur\auto_l oad.txt MD5: DD98A43CB27EFD5BCC29EFB23FDD6CA5) conhost.exe (PID: 3776 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
cmd.exe (PID: 4836 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Use rs\user\Do wnloads\mG YRbZUhoR\N ezur\start .bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 6056 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cacls.exe (PID: 5008 cmdline:
C:\Windows \system32\ cacls.exe" "C:\Windo ws\system3 2\config\s ystem MD5: A353590E06C976809F14906746109758) Nezur.exe (PID: 4984 cmdline:
Nezur.exe auto_load. txt MD5: DD98A43CB27EFD5BCC29EFB23FDD6CA5) conhost.exe (PID: 5956 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
cmd.exe (PID: 996 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Dow nloads\mGY RbZUhoR\Ne zur\start. bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 60 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cacls.exe (PID: 4676 cmdline:
C:\Windows \system32\ cacls.exe" "C:\Windo ws\system3 2\config\s ystem MD5: A353590E06C976809F14906746109758) wscript.exe (PID: 5328 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\Temp\ge tadmin.vbs " MD5: A47CBE969EA935BDD3AB568BB126BC80) cmd.exe (PID: 4476 cmdline:
"C:\Window s\System32 \cmd.exe" /c C:\User s\user\DOW NLO~1\MGYR BZ~1\Nezur \start.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 5952 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cacls.exe (PID: 6152 cmdline:
C:\Windows \system32\ cacls.exe" "C:\Windo ws\system3 2\config\s ystem MD5: A353590E06C976809F14906746109758) Nezur.exe (PID: 908 cmdline:
Nezur.exe auto_load. txt MD5: DD98A43CB27EFD5BCC29EFB23FDD6CA5) conhost.exe (PID: 4412 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
- • Compliance
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Source: | File created: |
Source: | DNS query: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
System Summary |
---|
Source: | Zip Entry: |
Source: | Dropped file: | Jump to dropped file |
Source: | COM Object queried: |
Source: | Classification label: |
Source: | File created: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: |
Source: | Process created: |
Source: | Process created: |
Source: | File read: |
Source: | Key opened: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Source: | Window detected: |
Source: | Window detected: |
Persistence and Installation Behavior |
---|
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: |
Source: | Process created: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Window found: | ||
Source: | Window found: | ||
Source: | Window found: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Source: | Key value queried: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 212 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Services File Permissions Weakness | 1 Services File Permissions Weakness | 1 Masquerading | OS Credential Dumping | 1 File and Directory Discovery | Remote Services | Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 212 Scripting | 11 Process Injection | 1 Services File Permissions Weakness | LSASS Memory | 12 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | 1 System Network Configuration Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | ReversingLabs | |||
3% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ip-api.com | 208.95.112.1 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
208.95.112.1 | ip-api.com | United States | 53334 | TUT-ASUS | false | |
23.54.201.219 | unknown | United States | 16625 | AKAMAI-ASUS | false |
Joe Sandbox version: | 39.0.0 Ruby |
Analysis ID: | 1381905 |
Start date and time: | 2024-01-26 20:44:49 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 54 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 1 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | Nezur.zip |
Detection: | MAL |
Classification: | mal56.winZIP@66/10@1/21 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): SIHClient.exe - Excluded IPs from analysis (wh
itelisted): 23.54.201.219 - Excluded domains from analysis
(whitelisted): slscr.update.m icrosoft.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found. - VT rate limit hit for: Nezur.
zip
Process: | C:\Users\user\Downloads\mGYRbZUhoR\Nezur\Nezur.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 109 |
Entropy (8bit): | 4.636579831743151 |
Encrypted: | false |
SSDEEP: | |
MD5: | 32C10AB47E31A6FC74F2A012C67D5011 |
SHA1: | BC419BE2869B284532464E276D56BABFEB687661 |
SHA-256: | 7CFE53ED655A99E8CDD0BF258A2C1EAA2D5B23C92FFB966BE93763EB00259B0F |
SHA-512: | 31053DD59C73727C31EE0D72D75B09C05D2E666811AFB92938142738DAA418B9FE937A10C251D8C45EA0BA07319672C140BF5D9982EA84BD5E35C3898EDEE168 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 147 |
Entropy (8bit): | 5.164665865819676 |
Encrypted: | false |
SSDEEP: | |
MD5: | 91B5187A287D7FA25B27DE459B13EE5E |
SHA1: | F11FF1D448686CFA85FB234E23FFA573680E2847 |
SHA-256: | 70302F46C9F9F7F7CD4B46C5A9A42DF6D3E8EA291EF7B0C874C3473E43541E49 |
SHA-512: | 82E50DBEBB27F77857CAC46F4BD1E93E9AF9D0068E1304EE1A11F3A834F928B4C77988E2EDC7D188416EB47BB663866A9E9065EC63DFE5F69BD37D9B88301153 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Program Files\7-Zip\7zG.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 91136 |
Entropy (8bit): | 6.34670024833589 |
Encrypted: | false |
SSDEEP: | |
MD5: | DD98A43CB27EFD5BCC29EFB23FDD6CA5 |
SHA1: | 38F621F3F0DF5764938015B56ECFA54948DDE8F5 |
SHA-256: | 1CF20B8449EA84C684822A5E8AB3672213072DB8267061537D1CE4EC2C30C42A |
SHA-512: | 871A2079892B1EB54CB761AEBD500AC8DA96489C3071C32A3DAB00200F74F4E12B9AB6C62623C53AEA5B8BE3FC031FB1B3E628FFE15D73323D917083240742B0 |
Malicious: | false |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Program Files\7-Zip\7zG.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1280 |
Entropy (8bit): | 5.1879148053347794 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4D61D6CF953627733AC13DD5E6CC8E69 |
SHA1: | B930E8C44BB9AD460936AEC495D53341954AEE07 |
SHA-256: | 667BCF026DCD5BCE1D13F834B0E369F3EA97DE875A46E11C0B3D5399113E7556 |
SHA-512: | A5110FA0240B8A9F77B18F134FF4ECF76D6EEDF3ECABCE932C8F97F3E2EDF355E925734A2FDB170723B6BAA9C26500C955536520874FFE0E6F98F440FB9B2C15 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\7-Zip\7zG.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 192435 |
Entropy (8bit): | 6.196471432315464 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1E6B9406FD84312CB2BBD29293F1A344 |
SHA1: | 543A81B1E1934C1CF0232A20869C428727A25454 |
SHA-256: | CF63912C3B3CCFACD48E8C35FC5FDD401135E6D56978FC0012CE86B0A4A81E0F |
SHA-512: | A977E8E98734DA9624C92CE2BD2AE3B2F3D3B910A961339AA223A00828536E979B8B6B603DDF7952E2625B1AE26D1E2931AA4C6DFA47DE9908B536780D06767F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\7-Zip\7zG.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 916 |
Entropy (8bit): | 4.938578928527749 |
Encrypted: | false |
SSDEEP: | |
MD5: | 024AB27DFE02DBCD5357528AC4DBE028 |
SHA1: | 2F2B7DF7B4557E274D4255CEBD65D6D7C125CF95 |
SHA-256: | C029522BB51F2EEA602E3818BE4B495282CC2D8DA92421F8BF3CED7DC46098BD |
SHA-512: | F87D48447E5663BE7E63F7F7934D33C795F2201ACC753720BBF77AF49CF8AB44B6F9618A2A22DD8F08A5D67424CA0C7C566B15B3F172EDC34AF4B29A23B5D137 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\7-Zip\7zG.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 606208 |
Entropy (8bit): | 6.7850772365784655 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3DFF7448B43FCFB4DC65E0040B0FFB88 |
SHA1: | 583CDAB08519D99F49234965FFD07688CCF52C56 |
SHA-256: | FF976F6E965E3793E278FA9BF5E80B9B226A0B3932B9DA764BFFC8E41E6CDB60 |
SHA-512: | CDCBE0EC9DDD6B605161E3C30CE3DE721F1333FCE85985E88928086B1578435DC67373C3DC3492ED8EAE0D63987CAC633AA4099B205989DCBB91CBBFC8F6A394 |
Malicious: | false |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Program Files\7-Zip\7zG.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 548 |
Entropy (8bit): | 5.175168398554481 |
Encrypted: | false |
SSDEEP: | |
MD5: | 12C37BF6537BFDF93B80C31F6D1391B2 |
SHA1: | 43DF564E4988008F3E97167837F58F1452CF3D13 |
SHA-256: | CAB7B8973DD5F7252AF6A1A080DEEC442ACD1E6BDD6C7476BD73E39553751222 |
SHA-512: | C59645DA2377EC2EB8C4CA75174379134DC657741EE324FC6FD38170B9704852BF136A919FE0363EA85BEFE61E8838EF74DAD07E365392D8F8F6462BB1BA75F9 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\cacls.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 121 |
Entropy (8bit): | 4.323081947925383 |
Encrypted: | false |
SSDEEP: | |
MD5: | 43B1EC1407EA9C0219A563FFFEEAE780 |
SHA1: | C42041802E99A95E6CBAE13E3E20EBFBA3237BB2 |
SHA-256: | 7E5146BF6F0B6AA61AFD4E3A6031D6DEF0F37523A22D75086B8E0E21D22E4B16 |
SHA-512: | 5307D7E089BEA4DAC250D0B606C80DF13CCA0A7ECB622BF61B37AD736FFC44EA68F9B993E4743F2AB220FF950E9D9B423524D4E10C0B2D1CE280A7D9B5095DE0 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.996725517887312 |
TrID: |
|
File name: | Nezur.zip |
File size: | 489'483 bytes |
MD5: | af97dda652b878779309c854dbb05475 |
SHA1: | ecca25d21b423c7f89c7727533a162e68368cbd3 |
SHA256: | 9b022527c62a75e4646df18d77accea72e30bbe6e35be379f14dff5e2951c922 |
SHA512: | 50f0d9ccf9ef3b7a5fceb326ce5cd25b71ff6bcb5e0b15d5c70f925e1d03781f3c34433bd83bd804419e23ba1d212ff56b2cd30d8d398e5eed4ad4af46694b5c |
SSDEEP: | 12288:5iN+kU0Yz3jBL75xwc4XscIFl4zA6fzvBLzkwRM:cKjRdxwr81FlQxfDxzk3 |
TLSH: | EAA423110DAD2D94C18838521D6509F211A16CCAEE3DECACF4E1D8A1BFE3C92EF76597 |
File Content Preview: | PK.........-7X................configs/PK........n.5X.E..F...........configs/autosave.cfgu.;o.0....s....-.a.`.>...&.C;u.c...k............@V........R.$..o/...wN'..54...g...J..9.by.[.m..8:.v^....4..>..+.uA...=..J.../.O..!".n.?.s.Ol.k....JK..d+....!........i? |