Report - file.exe

Raccoon Stealer Glupteba
ScreenShot
Created 2021.04.17 10:25 Machine s1_win7_x6402
Filename file.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
3.6
ZERO API file : malware
VT API (file) 24 detected (AIDetect, malware1, malicious, high confidence, Unsafe, Save, confidence, 100%, Attribute, HighConfidence, GenKryptik, FEDH, TrojanX, R + Troj, Androm, Wacatac, score, ZexaF, SCW@aqppZDcG, Obscure, CLOUD, Static AI, Malicious PE)
md5 28babff4bf714869ede6763962b401f6
sha256 a2d3a21b0f2d7e34ea7498d45676f0e9879e734910c55fd38d1b815bccbe2fda
ssdeep 12288:QP8Twnt2BfYyPXDBQQockSCdEDSjZPkbkBlxxQXg2T1fFWvzoD0:bTjBAsNPoJSNSPTxjOZFWvUw
imphash 7fc39213713180aae00d5962f7c21023
impfuzzy 48:g1c8pO4plkBw8xj0XcA9ep6Ot1tl37n98cbd1GnNZed8:2fO4plP8xoX/26o1tl3798c51GH1
  Network IP location

Signature (9cnts)

Level Description
warning File has been identified by 24 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (10cnts)

Level Name Description Collection
danger Raccoon_Stealer_1_Zero Raccoon Stealer binaries (upload)
danger Trojan_Win32_Glupteba_1_Zero Trojan Win32 Glupteba binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check Signature Zero binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasDebugData DebugData Check binaries (upload)
info IsPacked Entropy Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)
info win_files_operation Affect private profile binaries (upload)
info win_mutex Create or check mutex binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x4a4008 WriteConsoleW
 0x4a400c GetSystemPowerStatus
 0x4a4010 DeleteVolumeMountPointW
 0x4a4014 Sleep
 0x4a4018 GetDefaultCommConfigW
 0x4a401c CreateMutexW
 0x4a4020 GetStdHandle
 0x4a4024 InterlockedDecrement
 0x4a4028 SetSystemTimeAdjustment
 0x4a402c FileTimeToSystemTime
 0x4a4030 GetNamedPipeHandleStateW
 0x4a4034 CallNamedPipeW
 0x4a4038 EnumResourceNamesW
 0x4a403c BuildCommDCBAndTimeoutsA
 0x4a4040 EnterCriticalSection
 0x4a4044 DebugSetProcessKillOnExit
 0x4a4048 EnumTimeFormatsW
 0x4a404c TlsSetValue
 0x4a4050 GetACP
 0x4a4054 WriteFile
 0x4a4058 GetCurrentActCtx
 0x4a405c ReleaseActCtx
 0x4a4060 AddRefActCtx
 0x4a4064 GetHandleInformation
 0x4a4068 OpenFile
 0x4a406c VerifyVersionInfoA
 0x4a4070 GetVersionExA
 0x4a4074 FreeLibrary
 0x4a4078 LoadLibraryExW
 0x4a407c GetComputerNameA
 0x4a4080 CommConfigDialogA
 0x4a4084 GetProcessPriorityBoost
 0x4a4088 lstrcatA
 0x4a408c LoadLibraryW
 0x4a4090 LocalAlloc
 0x4a4094 SetEndOfFile
 0x4a4098 CancelWaitableTimer
 0x4a409c GetCurrentDirectoryW
 0x4a40a0 GetCommMask
 0x4a40a4 HeapFree
 0x4a40a8 RaiseException
 0x4a40ac GetBinaryTypeA
 0x4a40b0 LocalSize
 0x4a40b4 SetConsoleMode
 0x4a40b8 GetLargestConsoleWindowSize
 0x4a40bc WriteConsoleInputW
 0x4a40c0 OpenMutexW
 0x4a40c4 SetThreadContext
 0x4a40c8 AddAtomW
 0x4a40cc FindVolumeMountPointClose
 0x4a40d0 GetSystemTime
 0x4a40d4 GetCommandLineA
 0x4a40d8 SetLocalTime
 0x4a40dc GetLastError
 0x4a40e0 GetSystemTimeAsFileTime
 0x4a40e4 DisconnectNamedPipe
 0x4a40e8 SetConsoleCursorInfo
 0x4a40ec TerminateThread
 0x4a40f0 GetFileAttributesW
 0x4a40f4 SetLastError
 0x4a40f8 lstrlenA
 0x4a40fc CompareStringW
 0x4a4100 CompareStringA
 0x4a4104 VirtualProtect
 0x4a4108 CreateJobObjectA
 0x4a410c DeleteFileA
 0x4a4110 RtlUnwind
 0x4a4114 TerminateProcess
 0x4a4118 GetCurrentProcess
 0x4a411c UnhandledExceptionFilter
 0x4a4120 SetUnhandledExceptionFilter
 0x4a4124 IsDebuggerPresent
 0x4a4128 GetStartupInfoA
 0x4a412c HeapAlloc
 0x4a4130 LeaveCriticalSection
 0x4a4134 GetProcAddress
 0x4a4138 GetModuleHandleA
 0x4a413c GetModuleHandleW
 0x4a4140 TlsGetValue
 0x4a4144 TlsAlloc
 0x4a4148 TlsFree
 0x4a414c InterlockedIncrement
 0x4a4150 GetCurrentThreadId
 0x4a4154 GetCurrentThread
 0x4a4158 ExitProcess
 0x4a415c GetModuleFileNameA
 0x4a4160 FreeEnvironmentStringsA
 0x4a4164 GetEnvironmentStrings
 0x4a4168 FreeEnvironmentStringsW
 0x4a416c WideCharToMultiByte
 0x4a4170 GetEnvironmentStringsW
 0x4a4174 SetHandleCount
 0x4a4178 GetFileType
 0x4a417c DeleteCriticalSection
 0x4a4180 HeapCreate
 0x4a4184 HeapDestroy
 0x4a4188 VirtualFree
 0x4a418c QueryPerformanceCounter
 0x4a4190 GetTickCount
 0x4a4194 GetCurrentProcessId
 0x4a4198 SetFilePointer
 0x4a419c GetConsoleCP
 0x4a41a0 GetConsoleMode
 0x4a41a4 GetCPInfo
 0x4a41a8 GetOEMCP
 0x4a41ac IsValidCodePage
 0x4a41b0 FatalAppExitA
 0x4a41b4 VirtualAlloc
 0x4a41b8 HeapReAlloc
 0x4a41bc HeapSize
 0x4a41c0 SetConsoleCtrlHandler
 0x4a41c4 InterlockedExchange
 0x4a41c8 LoadLibraryA
 0x4a41cc InitializeCriticalSectionAndSpinCount
 0x4a41d0 SetStdHandle
 0x4a41d4 WriteConsoleA
 0x4a41d8 GetConsoleOutputCP
 0x4a41dc MultiByteToWideChar
 0x4a41e0 LCMapStringA
 0x4a41e4 LCMapStringW
 0x4a41e8 GetStringTypeA
 0x4a41ec GetStringTypeW
 0x4a41f0 GetTimeFormatA
 0x4a41f4 GetDateFormatA
 0x4a41f8 GetUserDefaultLCID
 0x4a41fc GetLocaleInfoA
 0x4a4200 EnumSystemLocalesA
 0x4a4204 IsValidLocale
 0x4a4208 FlushFileBuffers
 0x4a420c GetLocaleInfoW
 0x4a4210 CreateFileA
 0x4a4214 CloseHandle
 0x4a4218 GetTimeZoneInformation
 0x4a421c SetEnvironmentVariableA
USER32.dll
 0x4a4224 GetComboBoxInfo
ADVAPI32.dll
 0x4a4000 ClearEventLogW

EAT(Export Address Table) Library

0x47c280 _lifan@8


Similarity measure (PE file only) - Checking for service failure