ScreenShot
Created 2021.04.01 09:20 Machine s1_win7_x6402
Filename ret5er.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
3
Behavior Score
2.0
ZERO API file : clean
VT API (file) 13 detected (Malicious, score, Artemis, FileRepMalware, Wacapew, confidence)
md5 68defeb5cbf90fac11e4db64d2e39ab5
sha256 fb94f0c62b1eb990c2c39413cda78b45690e275aceb85af58bb84c887fc4bb67
ssdeep 6144:M55557pKolKMBeDoiPW8x3IIiySuWkxm54uzHM8jYnqfo5CVU+BPWD0dCaPW4FiS:Yiu8OgkDQ80qf1VUS/XLh2jZIt
imphash
impfuzzy 3::
  Network IP location

Signature (5cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch File has been identified by 13 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasDebugData DebugData Check binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info ImportTableIsBad ImportTable Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) is none

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure