Report - reader.jar

UPX Malicious Library PE File OS Processor Check DLL PE32
ScreenShot
Created 2021.08.04 09:47 Machine s1_win7_x6402
Filename reader.jar
Type Java archive data (JAR)
AI Score Not founds Behavior Score
5.2
ZERO API file : malware
VT API (file) 6 detected (Maljava, Java, Alien, Artemis, Outbreak, AMAA, Malicious, score)
md5 62f16f566ecdf99cfc14e82dadf0f18e
sha256 04b9398217671d5282716edd773af60c3a57765b679214aa65a04f2565437190
ssdeep 192:Qvu/IefKMEEjGOZCUY6vvoIi3A64r+jSWGrKnq14uCuxAW:yuxfTjGsYinb6Kr76uCW
imphash
impfuzzy
  Network IP location

Signature (14cnts)

Level Description
watch Looks for the Windows Idle Time to determine the uptime
watch The process java.exe wrote an executable file to disk
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice File has been identified by 6 AntiVirus engines on VirusTotal as malicious
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
info Checks amount of memory in system
info Collects information to fingerprint the system (MachineGuid
info One or more processes crashed
info Queries for the computername

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch UPX_Zero UPX packed file binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)

Network (10cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://gtr.antoinfer.com/JpYeaQ5AOcDY/rfyxDpNI3mO/iJ3ovqS5v_2B5H/8_2FstgmLGy8SiY5LMx0P/EituxAw_2F1OT_2F/X1ci3b8Sjr8wAo1/66YBaY_2FksW8vd5vo/TEXd_2B2W/D2pVfVv3mXhAGWXDPytU/12Zw2ncyKTiv3go_2Fg/foUK_2BpSlCsNRew7G6G_2/FjRnzaxKHNolO/9wMZxS2S/ZbdD3kRoyjRmPKx8evd RU IT Outsourcing LLC 185.228.233.17 2611 mailcious
http://app.bighomegl.at/4E0ttg1gp_2Ftg4l1_2B/eWoaZ3c3FW95iKk417H/7xB7p1XLZlyeRkNPYn4CKT/J7muNdOXn6DxQ/ogzt4SJJ/GiRzl0CTb2sRT1GcnGWx_2B/5zRPscx2Yo/UlYLKtmtVbormrIIa/i98ki83IT3HK/7VbEyf0xeIm/AOmPHig3hq8uyi/r570yUoRqQ63LqrdYxqn1/tlGlFCDGGtgOANlU/wcwiSAfqxf_2 RU IT Outsourcing LLC 185.228.233.17 2612 mailcious
http://gtr.antoinfer.com/NfYGW6X8yzwJ/TmELLbBwdW8/83tNWrSsAj2oO4/3mzyhwtyvu9xtyhBWsmEB/jvXNrSaYUeg9877Z/YkmJwmj7sbSiAPM/wvOnCYU3mtanlAAWVF/lEOl7A3Bg/rUbUyj5LWePdqjlbaGUW/iSW2ckc2ykuZHBzXpot/akHudVkA_2Fm_2Bq9if8ml/0wuZHIUOvWQk8/o4RWoGKb/KPtvXi6uRZ0s9YIobMM RU IT Outsourcing LLC 185.228.233.17 2611 mailcious
http://gtr.antoinfer.com/RkrrjybChQ/2EXR8TFwqFx6VGRuO/Z1QFUB4IXCZD/Qd1860UstEI/0FpsdG207nYgJY/fCRqHqVZJg9116Ab4KV_2/FhRpJqUDX6mgFqsW/Gdwx_2F_2BxnFaZ/Lq789C1khgtpGx93q_/2Fhqyr4hh/GqqD1e8CEJbEMhIvrCSE/M3EODhmOAJC2X81BGtu/YufOphUnysDzRsTNhJMaEZ/YU8IWtJVc5pQ_ RU IT Outsourcing LLC 185.228.233.17 2611 mailcious
http://app.bighomegl.at/2BX4usqR3CA_/2BGc5QtYAkk/5sQ6xMttRRkp2M/4e_2Bzb1wuuVdjXiLpFsr/WsqZJWNfhuYjSGsc/ideV2yEdm89knSR/K9gbcsE4Nafxh70syF/AFgpdwBcE/swkgenw1UzriUWCHteY_/2FJ1fxEg4WYRspNakt4/WsqnHSeo1RsAJxvNSqO_2B/KnTqsuw8WKdm1/RgI0C0Gy/VvsFdangS27BzKwMpW5l RU IT Outsourcing LLC 185.228.233.17 2612 mailcious
gtr.antoinfer.com RU IT Outsourcing LLC 185.228.233.17 mailcious
app.bighomegl.at RU IT Outsourcing LLC 185.228.233.17 mailcious
data.green-iraq.com US UNIFIEDLAYER-AS-1 162.241.216.53 malware
162.241.216.53 US UNIFIEDLAYER-AS-1 162.241.216.53 malware
185.228.233.17 RU IT Outsourcing LLC 185.228.233.17 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure