Summary | ZeroBOX

111.exe

Malicious Packer Malicious Library PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6402 Oct. 11, 2021, 9:55 a.m. Oct. 11, 2021, 10:06 a.m.
Size 251.8KB
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 9b164a8d1003a08d50d8d282da9cde81
SHA256 0ed30d6e1917aacb4c153772048cee51355c4613d8f751f4a106c96bdbe87bb4
CRC32 8AA1B9B8
ssdeep 6144:P/kyeY0/04tb4JiXlH5eF/vCP+l15sTNxZaXi3mi5u:Psy0/fbCuZq/aWUHL3mD
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library

IP Address Status Action
117.18.237.29 Active Moloch
164.124.101.2 Active Moloch
185.199.110.133 Active Moloch
52.78.231.108 Active Moloch
208.95.112.1 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49165 -> 52.78.231.108:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49166 -> 185.199.110.133:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49165
52.78.231.108:443
C=US, O=DigiCert, Inc., CN=DigiCert High Assurance TLS Hybrid ECC SHA256 2020 CA1 C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=github.com 84:63:b3:a9:29:12:cc:fd:1d:31:47:05:98:9b:ec:13:99:37:d0:d7
TLS 1.2
192.168.56.102:49166
185.199.110.133:443
C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=www.github.com 70:94:de:dd:e6:c4:69:48:3a:92:70:a1:48:56:78:2d:18:64:e0:b7

suspicious_features GET method with no useragent header suspicious_request GET https://github.com/UnamSanctam/SilentETHMiner/raw/master/SilentETHMiner/Resources/ethminer.zip
suspicious_features GET method with no useragent header suspicious_request GET https://raw.githubusercontent.com/UnamSanctam/SilentETHMiner/master/SilentETHMiner/Resources/ethminer.zip
request GET https://github.com/UnamSanctam/SilentETHMiner/raw/master/SilentETHMiner/Resources/ethminer.zip
request GET https://raw.githubusercontent.com/UnamSanctam/SilentETHMiner/master/SilentETHMiner/Resources/ethminer.zip
section {u'size_of_data': u'0x0000ee00', u'virtual_address': u'0x00002000', u'entropy': 7.963844057744755, u'name': u'.rdata', u'virtual_size': u'0x0000ec87'} entropy 7.96384405774 description A section with a high entropy has been found
section {u'size_of_data': u'0x000273f0', u'virtual_address': u'0x00013000', u'entropy': 7.965439463591778, u'name': u'.rsrc', u'virtual_size': u'0x000c13f0'} entropy 7.96543946359 description A section with a high entropy has been found
entropy 0.986331601054 description Overall entropy of this PE file is high
host 117.18.237.29
host 208.95.112.1
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 572
region_size: 61440
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000090000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000000000000002c
1 0 0
Process injection Process 1548 manipulating memory of non-child process 572
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 572
region_size: 61440
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000090000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000000000000002c
1 0 0