ScreenShot
Created 2021.04.01 09:40 Machine s1_win7_x6401
Filename yer5e.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
3
Behavior Score
1.2
ZERO API file : clean
VT API (file) 7 detected (malicious, confidence, Wacatac, score)
md5 fae1cf371d316ddd6918efda8b993f72
sha256 6903331c68ae731472d0096e25395c8057b28c44304eb9d2c8c9102cff5db0a1
ssdeep 12288:B5uiYusYXOYf5ip4hLFLTQAZVoblWXaLRT:B5OE/PUgwTZ
imphash
impfuzzy 3::
  Network IP location

Signature (4cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice File has been identified by 7 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasDebugData DebugData Check binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info ImportTableIsBad ImportTable Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) is none

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure