ScreenShot
Created 2021.04.23 11:06 Machine s1_win7_x6402
Filename parse.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
5
Behavior Score
4.0
ZERO API file : clean
VT API (file) 40 detected (malicious, high confidence, GenericKD, Artemis, Unsafe, NoobyProtect, EPOU, a variant of Generik, HLYBHYZ, R002H0CCB21, AGEN, ai score=81, Mamson, score, dGZlOgaZ9O8mNlwf3g, Generik, confidence, H8oA0ScA)
md5 787822a3f6e82ac53becdc6a50a8cdab
sha256 31c18d5f3b764fce15b94b6ec752acaa486d4ac16cab3bebb5b5b8f971804927
ssdeep 98304:OItV6CgtMvKgrJYxBZiTXr7iBOLleq40BgBweRQ0gQiDiGg4SnLhqhViTSovGse:O4V6JmvKeJYxBEr7AOcq43BwevAmLkhb
imphash 14416526a222cc34f1f48476eb8d208d
impfuzzy 3:s3rAVMQWmJIWgCALMAJMVx8Zn23S/KnA1MJuE9SX1Atd9CuABLbW7uRAn:4rAmD4sMQZn2yILe1IquABLbGeA
  Network IP location

Signature (8cnts)

Level Description
danger File has been identified by 40 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
notice Allocates read-write-execute memory (usually to unpack itself)
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (11cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info escalate_priv Escalade priviledges binaries (upload)
info HasOverlay Overlay Check binaries (upload)
info IsConsole (no description) binaries (upload)
info IsPacked Entropy Check binaries (upload)
info ldpreload (no description) binaries (upload)
info win_files_operation Affect private profile binaries (upload)
info win_mutex Create or check mutex binaries (upload)
info win_registry Affect system registries binaries (upload)
info win_token Affect system token binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure