SynapseX.exe

Sample information


43

Antivirus detections

0

IDS alerts

0

Processes

0

Http events

0

Contacted hosts

0

DNS Requests


    Score

Current activity of this Sample



Blacklist timeline


First seen: Wed Jul 23 2025 11:18:40 GMT+0000
Last seen: Wed Jul 23 2025 12:18:40 GMT+0000
Period: an hour

Hashes
Filename:
SynapseX.exe
md5:
fbec30d0ab6fbb837e9055acd667a0fa
sha1:
ebd771fc2cde96a6feb11920a0fca23261041037
sha256:
0ca5d52dbfbe15bea43f51703ac17c2d46d1e5062b528f4f122fd7acd8dd80d0

In depth details
Filetype:
application/x-dosexec
Classification:
malicious

Dates
Indexed:
Wed Jul 23 2025 13:19:08 GMT+0000 (2 months ago)
Last modified:
Wed Jul 23 2025 13:19:08 GMT+0000 (2 months ago)

Developers can check API Specification here:


Request:

          
curl -H "Authorization: Bearer <API_KEY>" https://api.maltiverse.com/sample/0ca5d52dbfbe15bea43f51703ac17c2d46d1e5062b528f4f122fd7acd8dd80d0
        

Request:

Alternatively you can use Maltiverse Python3 Library:
          
import requests
import json

url = 'https://api.maltiverse.com/sample/0ca5d52dbfbe15bea43f51703ac17c2d46d1e5062b528f4f122fd7acd8dd80d0'
response = requests.get(url)
print(json.dumps(response.json(), indent=4, sort_keys=True))
        

Request:

          
$url = 'https://api.maltiverse.com/sample/0ca5d52dbfbe15bea43f51703ac17c2d46d1e5062b528f4f122fd7acd8dd80d0'
$headers =  @{Authorization=("Bearer {0}" -f "<API_KEY>")}
$response = Invoke-RestMethod $url -Headers $headers
Write-Output $response
        

Response:

      
{
    "antivirus": [
        {
            "description": "Gen:Variant.Lazy.683079",
            "name": "ALYac"
        },
        {
            "description": "Malicious",
            "name": "APEX"
        },
        {
            "description": "Win64:MalwareX-gen [Cryp]",
            "name": "AVG"
        },
        {
            "description": "Malware/Win.Kryptik.C5780775",
            "name": "AhnLab-V3"
        },
        {
            "description": "Trojan.Lazy.DA6C47",
            "name": "Arcabit"
        },
        {
            "description": "Win64:MalwareX-gen [Cryp]",
            "name": "Avast"
        },
        {
            "description": "Gen:Variant.Lazy.683079",
            "name": "BitDefender"
        },
        {
            "description": "W64.AIDetectMalware",
            "name": "Bkav"
        },
        {
            "description": "exe.trojan.kryptik",
            "name": "CTX"
        },
        {
            "description": "Win.Packed.Lazy-10056364-0",
            "name": "ClamAV"
        },
        {
            "description": "win/malicious_confidence_100% (W)",
            "name": "CrowdStrike"
        },
        {
            "description": "Unsafe",
            "name": "Cylance"
        },
        {
            "description": "Malicious (score: 100)",
            "name": "Cynet"
        },
        {
            "description": "MALICIOUS",
            "name": "DeepInstinct"
        },
        {
            "description": "a variant of Win64/GenKryptik.HKPA",
            "name": "ESET-NOD32"
        },
        {
            "description": "malicious (high confidence)",
            "name": "Elastic"
        },
        {
            "description": "Gen:Variant.Lazy.683079 (B)",
            "name": "Emsisoft"
        },
        {
            "description": "W64/Kryptik.EZV!tr",
            "name": "Fortinet"
        },
        {
            "description": "Gen:Variant.Lazy.683079",
            "name": "GData"
        },
        {
            "description": "Detected",
            "name": "Google"
        },
        {
            "description": "Trojan.Win64.Kryptik.oa!s1",
            "name": "Gridinsoft"
        },
        {
            "description": "Trojan.Win32.InjectorNetT.beu",
            "name": "Kaspersky"
        },
        {
            "description": "malware.kb.a.989",
            "name": "Kingsoft"
        },
        {
            "description": "Trojan.Win32.InjectorNetT.1C!c",
            "name": "Lionic"
        },
        {
            "description": "Malware.Heuristic.2006",
            "name": "Malwarebytes"
        },
        {
            "description": "ti!0CA5D52DBFBE",
            "name": "McAfeeD"
        },
        {
            "description": "Gen:Variant.Lazy.683079",
            "name": "MicroWorld-eScan"
        },
        {
            "description": "generic.ml",
            "name": "Paloalto"
        },
        {
            "description": "Trj/GdSda.A",
            "name": "Panda"
        },
        {
            "description": "Trojan.Kryptik!8.8 (TFE:1:XggHT7Ps6hK)",
            "name": "Rising"
        },
        {
            "description": "Trojan.Win32.Save.a",
            "name": "Sangfor"
        },
        {
            "description": "Static AI - Suspicious PE",
            "name": "SentinelOne"
        },
        {
            "description": "BehavesLike.Win64.Generic.tc",
            "name": "Skyhigh"
        },
        {
            "description": "Troj/Krypt-AQA",
            "name": "Sophos"
        },
        {
            "description": "ML.Attribute.HighConfidence",
            "name": "Symantec"
        },
        {
            "description": "Win32.Trojan.Injectornett.Bdhl",
            "name": "Tencent"
        },
        {
            "description": "suspicious.low.ml.score",
            "name": "Trapmine"
        },
        {
            "description": "Artemis!FBEC30D0AB6F",
            "name": "TrellixENS"
        },
        {
            "description": "Trojan.Win32.VSX.PE04C9h",
            "name": "TrendMicro-HouseCall"
        },
        {
            "description": "Gen:Variant.Lazy.683079",
            "name": "VIPRE"
        },
        {
            "description": "Win.Infostealer.Lumma",
            "name": "Webroot"
        },
        {
            "description": "Troj/Krypt-AQA",
            "name": "ZoneAlarm"
        },
        {
            "description": "Trojan:Win/Sabsik.ET",
            "name": "alibabacloud"
        }
    ],
    "blacklist": [
        {
            "count": 1,
            "description": "Generic.Malware",
            "first_seen": "2025-07-23 12:18:40",
            "labels": [
                "malicious-activity"
            ],
            "last_seen": "2025-07-23 12:18:40",
            "ref": [
                21745
            ],
            "source": "MalwareBazaar Abuse.ch"
        }
    ],
    "classification": "malicious",
    "creation_time": "2025-07-23 13:19:08",
    "filename": [
        "SynapseX.exe"
    ],
    "filetype": "application/x-dosexec",
    "is_alive": false,
    "is_cdn": false,
    "is_cnc": false,
    "is_distributing_malware": false,
    "is_hosting": false,
    "is_iot_threat": false,
    "is_known_attacker": false,
    "is_known_scanner": false,
    "is_mining_pool": false,
    "is_open_proxy": false,
    "is_phishing": false,
    "is_sinkhole": false,
    "is_storing_phishing": false,
    "is_tor_node": false,
    "is_vpn_node": false,
    "md5": "fbec30d0ab6fbb837e9055acd667a0fa",
    "modification_time": "2025-07-23 13:19:08",
    "scoring_executed_time": "2025-07-23 13:19:09",
    "sha1": "ebd771fc2cde96a6feb11920a0fca23261041037",
    "sha256": "0ca5d52dbfbe15bea43f51703ac17c2d46d1e5062b528f4f122fd7acd8dd80d0",
    "type": "sample"
}