Size | 2.5MB |
---|---|
Type | PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows |
MD5 | 13a90868a8c1ead1d1f2e9130e5b535f |
SHA1 | 2f55bfa04ff39e843119a63c7306b1c7eaf73552 |
SHA256 | b064bf4d9839f9db3284de61a7c11e8e07daab079eb2323dee9c2d62e02b85e8 |
SHA512 |
e02a9f4d8db5991f2b03188feb5ad799805acfd15321f17663f0225fae054a74f05b7ff0f2b177e898b25c952a1d3b16287a8c272b5a9c0fda4dede5d0176e44
|
CRC32 | 6968B332 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Sept. 17, 2025, 3:56 p.m. | Sept. 17, 2025, 3:57 p.m. | 41 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-09-17 15:56:36,030 [analyzer] DEBUG: Starting analyzer from: C:\tmpwwr_kc 2025-09-17 15:56:36,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\lUgwHAunDhhOEBlqgdcPvlQHmxTTVJax 2025-09-17 15:56:36,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\HoAsOSevVWCfYOwqyUeiMKOAQVMN 2025-09-17 15:56:36,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-09-17 15:56:36,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-09-17 15:56:36,780 [analyzer] DEBUG: Started auxiliary module Disguise 2025-09-17 15:56:36,983 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-09-17 15:56:36,983 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-09-17 15:56:36,983 [analyzer] DEBUG: Started auxiliary module Human 2025-09-17 15:56:36,983 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-09-17 15:56:36,983 [analyzer] DEBUG: Started auxiliary module Reboot 2025-09-17 15:56:37,078 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-09-17 15:56:37,078 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-09-17 15:56:37,078 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-09-17 15:56:37,078 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-09-17 15:56:37,203 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\ToolUnlock_v5.2.exe' with arguments '' and pid 1312 2025-09-17 15:56:37,390 [analyzer] DEBUG: Loaded monitor into process with pid 1312 2025-09-17 15:56:38,262 [analyzer] INFO: Process with pid 1312 has terminated 2025-09-17 15:56:38,278 [analyzer] INFO: Process list is empty, terminating analysis. 2025-09-17 15:56:39,464 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-09-17 15:56:39,464 [analyzer] INFO: Analysis completed.
2025-09-17 15:56:37,418 [cuckoo.core.scheduler] INFO: Task #6974371: acquired machine win7x645 (label=win7x645) 2025-09-17 15:56:37,418 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.205 for task #6974371 2025-09-17 15:56:38,325 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1820716 (interface=vboxnet0, host=192.168.168.205) 2025-09-17 15:56:40,321 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x645 2025-09-17 15:56:41,637 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x645 to vmcloak 2025-09-17 15:56:53,266 [cuckoo.core.guest] INFO: Starting analysis #6974371 on guest (id=win7x645, ip=192.168.168.205) 2025-09-17 15:56:54,271 [cuckoo.core.guest] DEBUG: win7x645: not ready yet 2025-09-17 15:56:59,296 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x645, ip=192.168.168.205) 2025-09-17 15:56:59,377 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x645, ip=192.168.168.205, monitor=latest, size=6660546) 2025-09-17 15:57:00,972 [cuckoo.core.resultserver] DEBUG: Task #6974371: live log analysis.log initialized. 2025-09-17 15:57:01,903 [cuckoo.core.resultserver] DEBUG: Task #6974371 is sending a BSON stream 2025-09-17 15:57:02,246 [cuckoo.core.resultserver] DEBUG: Task #6974371 is sending a BSON stream 2025-09-17 15:57:03,250 [cuckoo.core.resultserver] DEBUG: Task #6974371: File upload for 'shots/0001.jpg' 2025-09-17 15:57:03,271 [cuckoo.core.resultserver] DEBUG: Task #6974371 uploaded file length: 133493 2025-09-17 15:57:04,341 [cuckoo.core.resultserver] DEBUG: Task #6974371: File upload for 'curtain/1758117399.37.curtain.log' 2025-09-17 15:57:04,344 [cuckoo.core.resultserver] DEBUG: Task #6974371 uploaded file length: 36 2025-09-17 15:57:04,438 [cuckoo.core.resultserver] DEBUG: Task #6974371: File upload for 'sysmon/1758117399.46.sysmon.xml' 2025-09-17 15:57:04,441 [cuckoo.core.resultserver] DEBUG: Task #6974371 uploaded file length: 24876 2025-09-17 15:57:05,328 [cuckoo.core.resultserver] DEBUG: Task #6974371 had connection reset for <Context for LOG> 2025-09-17 15:57:06,444 [cuckoo.core.guest] INFO: win7x645: analysis completed successfully 2025-09-17 15:57:06,454 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-09-17 15:57:06,489 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-09-17 15:57:08,521 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x645 to path /srv/cuckoo/cwd/storage/analyses/6974371/memory.dmp 2025-09-17 15:57:08,523 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x645 2025-09-17 15:57:17,995 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.205 for task #6974371 2025-09-17 15:57:18,311 [cuckoo.core.scheduler] DEBUG: Released database task #6974371 2025-09-17 15:57:18,333 [cuckoo.core.scheduler] INFO: Task #6974371: analysis procedure completed
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Communications over UDP network | rule | network_udp_sock | ||||||
description | Listen for incoming communication | rule | network_tcp_listen | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Communications use DNS | rule | network_dns | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token |
section | .symtab |
G Data Antivirus (Windows) | Virus: Trojan.GenericKDZ.113396 (Engine A) |
Avast Core Security (Linux) | Win64:Evo-gen [Trj] |
WithSecure (Linux) | Trojan.TR/Redcap.rzkrr |
eScan Antivirus (Linux) | Trojan.GenericKDZ.113396(DB) |
ESET Security (Windows) | a variant of WinGo/Kryptik.JD trojan |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
Bitdefender Antivirus (Linux) | Trojan.GenericKDZ.113396 |
Kaspersky Standard (Windows) | UDS:Trojan-PSW.Win32.Stealerc.rel |
Emsisoft Commandline Scanner (Windows) | Trojan.GenericKDZ.113396 (B) |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.WinGo.i!c |
Cynet | Malicious (score: 99) |
ALYac | Trojan.GenericKDZ.113396 |
Cylance | Unsafe |
VIPRE | Trojan.GenericKDZ.113396 |
Sangfor | Infostealer.Win32.Kryptik.V2qj |
CrowdStrike | win/malicious_confidence_70% (W) |
BitDefender | Trojan.GenericKDZ.113396 |
K7GW | Trojan ( 005cd5021 ) |
K7AntiVirus | Trojan ( 005cd5021 ) |
Arcabit | Trojan.Generic.D1BAF4 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of WinGo/Kryptik.JD |
Avast | Win64:Evo-gen [Trj] |
Kaspersky | Trojan-PSW.Win32.Stealerc.rel |
MicroWorld-eScan | Trojan.GenericKDZ.113396 |
Rising | Spyware.Stealer!8.3090 (CLOUD) |
Emsisoft | Trojan.GenericKDZ.113396 (B) |
F-Secure | Trojan.TR/Redcap.rzkrr |
TrendMicro | TrojanSpy.Win64.VIDAR.YXFILZ |
McAfeeD | ti!B064BF4D9839 |
CTX | exe.trojan.kryptik |
Sophos | Mal/Generic-S |
Webroot | W32.Malware.gen |
Detected | |
Avira | TR/Redcap.rzkrr |
Microsoft | Trojan:Win32/Wacatac.B!ml |
GData | Trojan.GenericKDZ.113396 |
Varist | W64/ABTrojan.UCGY-1652 |
AhnLab-V3 | Infostealer/Win.LummaC2.R723850 |
DeepInstinct | MALICIOUS |
Malwarebytes | Spyware.Lumma |
Ikarus | Trojan.WinGo.Crypt |
TrendMicro-HouseCall | TrojanSpy.Win64.VIDAR.YXFILZ |
TrellixENS | Artemis!13A90868A8C1 |
huorong | TrojanSpy/Stealer.ou |
Fortinet | W32/Kryptik.JD!tr |
AVG | Win64:Evo-gen [Trj] |
Paloalto | generic.ml |
alibabacloud | Trojan:Multi/Wacatac.B9nj |