ScreenShot
Created | 2021.07.13 10:23 | Machine | s1_win7_x6401 |
Filename | BIOPASS RAT.exe | ||
Type | PE32 executable (console) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 33 detected (GenericKD, Artemis, Unsafe, Starter, Save, malicious, ZexaF, c0Y@aeKsmzk, Attribute, HighConfidence, a variant of Python, Malware@#1sjf5b5dnwfmg, ai score=89, Ymacco, score, BScope, Wacatac, R002H0CDN21, Outbreak, susgen) | ||
md5 | eb66dcd416436e0589a4e4db48c6deaf | ||
sha256 | b5a16fb25a6b38547680cbfd3a21cc29621c28c3929e4552bb37834655456977 | ||
ssdeep | 768:71j+R1sS3tYjiCYSEqbKXUFfBj78vXe8Nl:5yBDCYSz2Xcqvx | ||
imphash | 7b18bad21b02595a7ab1d21c0a96eaf4 | ||
impfuzzy | 12:YRJRxr5TZnJCWiiARZqRJhPPXJNiXJcqVzJGX5XGXKYIk6lTpJqJiZC5S:8fx91JmncJ9enEX5XGKkoDqoZCM |
Network IP location
Signature (2cnts)
Level | Description |
---|---|
danger | File has been identified by 33 AntiVirus engines on VirusTotal as malicious |
notice | A process created a hidden window |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x40612c DeleteCriticalSection
0x406130 EnterCriticalSection
0x406134 GetConsoleWindow
0x406138 GetCurrentProcess
0x40613c GetCurrentProcessId
0x406140 GetCurrentThreadId
0x406144 GetLastError
0x406148 GetStartupInfoA
0x40614c GetSystemTimeAsFileTime
0x406150 GetTickCount
0x406154 InitializeCriticalSection
0x406158 LeaveCriticalSection
0x40615c QueryPerformanceCounter
0x406160 SetUnhandledExceptionFilter
0x406164 Sleep
0x406168 TerminateProcess
0x40616c TlsGetValue
0x406170 UnhandledExceptionFilter
0x406174 VirtualProtect
0x406178 VirtualQuery
msvcrt.dll
0x406180 __getmainargs
0x406184 __initenv
0x406188 __lconv_init
0x40618c __p__acmdln
0x406190 __p__fmode
0x406194 __set_app_type
0x406198 __setusermatherr
0x40619c _amsg_exit
0x4061a0 _cexit
0x4061a4 _initterm
0x4061a8 _iob
0x4061ac _onexit
0x4061b0 abort
0x4061b4 calloc
0x4061b8 exit
0x4061bc fprintf
0x4061c0 free
0x4061c4 fwrite
0x4061c8 malloc
0x4061cc memcpy
0x4061d0 signal
0x4061d4 strlen
0x4061d8 strncmp
0x4061dc vfprintf
SHELL32.dll
0x4061e4 ShellExecuteA
USER32.dll
0x4061ec ShowWindow
EAT(Export Address Table) is none
KERNEL32.dll
0x40612c DeleteCriticalSection
0x406130 EnterCriticalSection
0x406134 GetConsoleWindow
0x406138 GetCurrentProcess
0x40613c GetCurrentProcessId
0x406140 GetCurrentThreadId
0x406144 GetLastError
0x406148 GetStartupInfoA
0x40614c GetSystemTimeAsFileTime
0x406150 GetTickCount
0x406154 InitializeCriticalSection
0x406158 LeaveCriticalSection
0x40615c QueryPerformanceCounter
0x406160 SetUnhandledExceptionFilter
0x406164 Sleep
0x406168 TerminateProcess
0x40616c TlsGetValue
0x406170 UnhandledExceptionFilter
0x406174 VirtualProtect
0x406178 VirtualQuery
msvcrt.dll
0x406180 __getmainargs
0x406184 __initenv
0x406188 __lconv_init
0x40618c __p__acmdln
0x406190 __p__fmode
0x406194 __set_app_type
0x406198 __setusermatherr
0x40619c _amsg_exit
0x4061a0 _cexit
0x4061a4 _initterm
0x4061a8 _iob
0x4061ac _onexit
0x4061b0 abort
0x4061b4 calloc
0x4061b8 exit
0x4061bc fprintf
0x4061c0 free
0x4061c4 fwrite
0x4061c8 malloc
0x4061cc memcpy
0x4061d0 signal
0x4061d4 strlen
0x4061d8 strncmp
0x4061dc vfprintf
SHELL32.dll
0x4061e4 ShellExecuteA
USER32.dll
0x4061ec ShowWindow
EAT(Export Address Table) is none