Report - backdoor.exe

Generic Malware Malicious Packer UPX PE32 PE File
ScreenShot
Created 2021.07.13 10:16 Machine s1_win7_x6401
Filename backdoor.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
AI Score
7
Behavior Score
3.2
ZERO API file : clean
VT API (file) 34 detected (AIDetect, malware1, malicious, high confidence, Risktool, Flystudio, Unsafe, Save, BlackMoon, Attribute, HighConfidence, Tiny, Tiggre, Agentb, Generic ML PUA, Artemis, PUPStudio, AGEN, Score, KVM099, kcloud, Caynamer, BScope, Wacatac, ChinAd, Static AI, Malicious PE, Dinwod, frindll, CoinMiner, ESFJ, ZexaF, fmLfaKFYKOeb, confidence)
md5 a905e8ec7c21e72ecec790fab54a114a
sha256 b43d29ddd83f6ff9f8002718999d77247fe48d6c4709d3a8b1890d14550ef917
ssdeep 1536:h0tykrLFscBCtJNlDD6Vtj5qKb8HOpwlSyzCP+azl9lzDbFS5jIfcn0ELuygMzU:h0tXfKcBeJTwtgKbg/zCPJlzbc5xdgMQ
imphash 8b9115bdb533867fb541799f78a743d7
impfuzzy 6:omRgsfOiBJAEoZ/OEGDzyRZ6FW46PWTXqVqXvO1n:omRgWVABZG/DzM6FNIeXukgn
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 34 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
info Checks amount of memory in system
info The executable uses a known packer

Rules (5cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
1.117.165.236 Unknown 1.117.165.236 clean

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x452364 RegCloseKey
COMCTL32.dll
 0x45236c None
GDI32.dll
 0x452374 SaveDC
KERNEL32.DLL
 0x45237c LoadLibraryA
 0x452380 ExitProcess
 0x452384 GetProcAddress
 0x452388 VirtualProtect
RASAPI32.dll
 0x452390 RasHangUpA
USER32.dll
 0x452398 GetDC
WININET.dll
 0x4523a0 InternetOpenA
WINSPOOL.DRV
 0x4523a8 OpenPrinterA
WS2_32.dll
 0x4523b0 send

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure