Size | 3.8MB |
---|---|
Type | PE32+ executable (console) x86-64, for MS Windows |
MD5 | bf0f05e857bc6e78975d52d3aa430483 |
SHA1 | fff043b05d3b0dfa3aa329129ab479cf90586341 |
SHA256 | 735e28ef9f0956d53cf6be1ca7520e7c66a5b558122d4f8b309ef1aa2825d919 |
SHA512 |
fb687d3f67d279964cb308db41b3ea9d22aa0b6c4600528313b39a8c809cce0cd6cc7d20b1db68c4e0b8b031c9162c3a39722d1dc93c89052394b258617cfc3b
|
CRC32 | 76783483 |
ssdeep | None |
PDB Path | C:\Users\jordan\Downloads\usermode-master (2)\usermode-master\x64\Release\Valex_External.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Aug. 7, 2025, 10:15 p.m. | Aug. 7, 2025, 10:16 p.m. | 36 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-08-07 22:15:29,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp2pjrvv 2025-08-07 22:15:29,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\kdjIcaJwJvoxctOPN 2025-08-07 22:15:29,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\sxzxKJpBXxOynZOmJNrGlnEV 2025-08-07 22:15:29,280 [analyzer] DEBUG: Started auxiliary module Curtain 2025-08-07 22:15:29,296 [analyzer] DEBUG: Started auxiliary module DbgView 2025-08-07 22:15:29,750 [analyzer] DEBUG: Started auxiliary module Disguise 2025-08-07 22:15:29,953 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-08-07 22:15:29,953 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-08-07 22:15:29,953 [analyzer] DEBUG: Started auxiliary module Human 2025-08-07 22:15:29,953 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-08-07 22:15:29,953 [analyzer] DEBUG: Started auxiliary module Reboot 2025-08-07 22:15:30,000 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-08-07 22:15:30,000 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-08-07 22:15:30,015 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-08-07 22:15:30,015 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-08-07 22:15:30,155 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Valex_External.exe' with arguments '' and pid 2292 2025-08-07 22:15:31,155 [analyzer] INFO: Process with pid 2292 has terminated 2025-08-07 22:15:31,155 [analyzer] INFO: Process list is empty, terminating analysis. 2025-08-07 22:15:32,390 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-08-07 22:15:32,390 [analyzer] INFO: Analysis completed.
2025-08-07 22:15:30,204 [cuckoo.core.scheduler] INFO: Task #6824359: acquired machine win7x648 (label=win7x648) 2025-08-07 22:15:30,204 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.208 for task #6824359 2025-08-07 22:15:30,939 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2226282 (interface=vboxnet0, host=192.168.168.208) 2025-08-07 22:15:32,645 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x648 2025-08-07 22:15:33,545 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x648 to vmcloak 2025-08-07 22:15:43,426 [cuckoo.core.guest] INFO: Starting analysis #6824359 on guest (id=win7x648, ip=192.168.168.208) 2025-08-07 22:15:44,433 [cuckoo.core.guest] DEBUG: win7x648: not ready yet 2025-08-07 22:15:49,457 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x648, ip=192.168.168.208) 2025-08-07 22:15:49,534 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x648, ip=192.168.168.208, monitor=latest, size=6660546) 2025-08-07 22:15:50,881 [cuckoo.core.resultserver] DEBUG: Task #6824359: live log analysis.log initialized. 2025-08-07 22:15:51,789 [cuckoo.core.resultserver] DEBUG: Task #6824359 is sending a BSON stream 2025-08-07 22:15:53,036 [cuckoo.core.resultserver] DEBUG: Task #6824359: File upload for 'shots/0001.jpg' 2025-08-07 22:15:53,051 [cuckoo.core.resultserver] DEBUG: Task #6824359 uploaded file length: 133482 2025-08-07 22:15:54,174 [cuckoo.core.resultserver] DEBUG: Task #6824359: File upload for 'curtain/1754597732.27.curtain.log' 2025-08-07 22:15:54,186 [cuckoo.core.resultserver] DEBUG: Task #6824359 uploaded file length: 36 2025-08-07 22:15:54,290 [cuckoo.core.resultserver] DEBUG: Task #6824359: File upload for 'sysmon/1754597732.39.sysmon.xml' 2025-08-07 22:15:54,293 [cuckoo.core.resultserver] DEBUG: Task #6824359 uploaded file length: 57632 2025-08-07 22:15:55,125 [cuckoo.core.resultserver] DEBUG: Task #6824359 had connection reset for <Context for LOG> 2025-08-07 22:15:56,459 [cuckoo.core.guest] INFO: win7x648: analysis completed successfully 2025-08-07 22:15:56,471 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-08-07 22:15:56,491 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-08-07 22:15:58,107 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x648 to path /srv/cuckoo/cwd/storage/analyses/6824359/memory.dmp 2025-08-07 22:15:58,109 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x648 2025-08-07 22:16:06,562 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.208 for task #6824359 2025-08-07 22:16:06,861 [cuckoo.core.scheduler] DEBUG: Released database task #6824359 2025-08-07 22:16:06,877 [cuckoo.core.scheduler] INFO: Task #6824359: analysis procedure completed
description | Possibly employs anti-virtualization techniques | rule | vmdetect | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_FindWindowA_iat | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Checks for the presence of known debug tools | rule | anti_dbgtools | ||||||
description | Listen for incoming communication | rule | network_tcp_listen | ||||||
description | Communications smtp | rule | network_smtp_raw | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Communications use DNS | rule | network_dns |
pdb_path | C:\Users\jordan\Downloads\usermode-master (2)\usermode-master\x64\Release\Valex_External.pdb |
G Data Antivirus (Windows) | Virus: Gen:Variant.Zusy.594877 (Engine A) |
Avast Core Security (Linux) | Win64:MalwareX-gen [Cryp] |
WithSecure (Linux) | Heuristic.HEUR/AGEN.1379366 |
eScan Antivirus (Linux) | Gen:Variant.Zusy.594877(DB) |
ESET Security (Windows) | a variant of Win64/GenKryptik_AGen.AHT trojan |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
Bitdefender Antivirus (Linux) | Gen:Variant.Zusy.594877 |
Emsisoft Commandline Scanner (Windows) | Gen:Variant.Zusy.594877 (B) |
Bkav | W64.AIDetectMalware |
Cynet | Malicious (score: 100) |
ALYac | Gen:Variant.Zusy.594877 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Zusy.594877 |
CrowdStrike | win/malicious_confidence_90% (W) |
BitDefender | Gen:Variant.Zusy.594877 |
K7GW | Trojan ( 005c85f21 ) |
K7AntiVirus | Trojan ( 005c85f21 ) |
Arcabit | Trojan.Zusy.D913BD |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win64/GenKryptik_AGen.AHT |
APEX | Malicious |
Avast | Win64:MalwareX-gen [Cryp] |
Alibaba | Trojan:Win64/GenKryptik.fd32d6ce |
MicroWorld-eScan | Gen:Variant.Zusy.594877 |
Rising | Trojan.Kryptik!8.8 (TFE:5:EssXKppeRfV) |
Emsisoft | Gen:Variant.Zusy.594877 (B) |
F-Secure | Heuristic.HEUR/AGEN.1379366 |
McAfeeD | ti!735E28EF9F09 |
CTX | exe.trojan.agen |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
Detected | |
Avira | HEUR/AGEN.1379366 |
Kingsoft | Win64.Troj.zusy.v |
Gridinsoft | Trojan.Win64.Kryptik.sa |
Microsoft | Trojan:Win64/Zusy!rfn |
GData | Gen:Variant.Zusy.594877 |
AhnLab-V3 | Malware/Win.Barys.R715254 |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.2952065517 |
Ikarus | Trojan.Win64.Krypt |
Panda | Trj/GdSda.A |
TrendMicro-HouseCall | TROJ_GEN.R002H01H625 |
Tencent | Win32.Trojan.Agen.Lqil |
TrellixENS | Artemis!BF0F05E857BC |
huorong | Trojan/Agent.cfs |
Fortinet | W64/GenKryptik.WS!tr |
AVG | Win64:MalwareX-gen [Cryp] |
Paloalto | generic.ml |
alibabacloud | Trojan:Win/Zusy.AXHJ3DGW |