ScreenShot
Created 2021.04.02 16:53 Machine s1_win7_x6401
Filename 1.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
1.6
ZERO API file : clean
VT API (file) 10 detected (malicious, high confidence, Artemis, confidence, Wacatac, score, Unsafe, ZedlaF, eq4@aqnXp8d)
md5 5512180f20e8279acc4d71abbfeb2433
sha256 b8b0a5451344e49b72f422d3fa16c49eb0e3864f2b6c58e539e2e9774cd60824
ssdeep 1536:DqFTghmBv//NxscRzNVSkTF9hqyNHgUZ:DNhW/MCqkTjhqk
imphash 409c7c1ba51d89659506cf4700331508
impfuzzy 3:sBaAXwGXWX1AVegpnZhXBE9mb2gCA7Sn:XyFA1upnZBxin
  Network IP location

Signature (5cnts)

Level Description
watch File has been identified by 10 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Queries for the computername

Rules (6cnts)

Level Name Description Collection
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasDebugData DebugData Check binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
moviesmenia.com Unknown mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure