Report - c0r0n4x.spc

AntiDebug AntiVM ELF
ScreenShot
Created 2021.05.24 18:22 Machine s1_win7_x6402
Filename c0r0n4x.spc
Type ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
AI Score Not founds Behavior Score
2.6
ZERO API file : clean
VT API (file) 29 detected (Linux, Mirai, Save, Gafgyt, Camelot, a variant of Linux, SMNM4, Unix, fbrf, ai score=82, ASELF, Gen3, CLASSIC)
md5 4ad6111429ca4e0546a847815659843c
sha256 ecc27136ecd8d4412a2d5baf50d9e2125bd73f05a91344d03b098fcf009c8ca8
ssdeep 1536:RnOkiHp1OkFRFdSZTk9+2kl+ySFUx+D9qcC+:NNxEZqBAD9Nd
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 29 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger

Rules (9cnts)

Level Name Description Collection
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsELF Executable and Linking Format executable file (Linux/Unix) binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure