ScreenShot
Created | 2021.07.08 09:30 | Machine | s1_win7_x6402 |
Filename | bin.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 51 detected (AIDetect, malware1, Noon, malicious, high confidence, Razy, GenericRXCD, Unsafe, Save, Formbook, Eldorado, ccmw, Adkl, A + Troj, Siggen9, R002C0CG121, VirRansom, Static AI, Malicious PE, susgen, ZPACK, ai score=100, score, BScope, TrojanPSW, CLASSIC, GenKryptik, AYEB, confidence, 100%, HxQBTyoA) | ||
md5 | 702b18b0650c0234aae73c200dd00617 | ||
sha256 | e02a6b078d2406f7e8dcf84680c5ecad971b13b0c557669de04914b1b1b10489 | ||
ssdeep | 3072:oe4zgIF7CbNoTyHyBp+88bLxP6IQuTv0dk3ME1qoBEWjYtvdeu:WlBTySmbLxP6iv0dSBNjYtvd | ||
imphash | |||
impfuzzy | 3:: |
Network IP location
Signature (7cnts)
Level | Description |
---|---|
danger | File has been identified by 51 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | Win_Trojan_Formbook_Zero | Used Formbook | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (11cnts) ?
Suricata ids
PE API
IAT(Import Address Table) is none
EAT(Export Address Table) is none
EAT(Export Address Table) is none