ScreenShot
Created | 2021.08.20 09:36 | Machine | s1_win7_x6402 |
Filename | lipster.exe | ||
Type | PE32 executable (console) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 49 detected (AIDetect, malware2, malicious, high confidence, Siggen3, GenericKD, Unsafe, Save, confidence, 100%, Kryptik, ZexaF, pq0@aqWjjopi, Eldorado, Attribute, HighConfidence, HMDS, TrojanX, Ljud, A + Troj, Krypt, HPGen, Emotet, Score, RedLineSteal, iyczb, kcloud, Azorult, NetSteal, HW7Y0T, BScope, Blocker, ai score=84, CLASSIC, Static AI, Suspicious PE, susgen, GenKryptik, FJEX, Genetic, HwoCXQAA) | ||
md5 | 35878c80b3957a04c99270e45d66f3cc | ||
sha256 | b55704fa2fb3db346332e5cfa37a04628a2ac747184e4104c929704eb4b5b2b4 | ||
ssdeep | 3072:w+pHi9bPhpasaKBMjUAzgCEkk9dADb/rXKFmgploIDbLhYLCfZzENRjt7/v8KT0X:lJiJPhpahKyNZeq/rXKF97xiqAl/7 | ||
imphash | d14e6f286b56e073587d660c9cc6ef7f | ||
impfuzzy | 24:CbkDwu9ErjtZ8XBkrkRri/xEIOV4FndcKcDS1+pX86+chgYDttoLOovEGb2cwSJW:cZ8Xef/5ndH1KAMgYDtto6VGacTvv0wU |
Network IP location
Signature (5cnts)
Level | Description |
---|---|
danger | File has been identified by 49 AntiVirus engines on VirusTotal as malicious |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | This executable has a PDB path |
Rules (5cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (upload) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x42b000 SetLocalTime
0x42b004 WriteConsoleOutputW
0x42b008 InterlockedIncrement
0x42b00c GetConsoleAliasA
0x42b010 InterlockedDecrement
0x42b014 GetSystemWindowsDirectoryW
0x42b018 SetEnvironmentVariableW
0x42b01c GetEnvironmentStringsW
0x42b020 WaitForSingleObject
0x42b024 GetSystemDefaultLCID
0x42b028 GetModuleHandleW
0x42b02c SetThreadUILanguage
0x42b030 GetConsoleAliasesLengthA
0x42b034 GetCompressedFileSizeW
0x42b038 CreateActCtxW
0x42b03c InitializeCriticalSection
0x42b040 GetConsoleCP
0x42b044 GetSystemDirectoryW
0x42b048 ReadConsoleInputA
0x42b04c GetVersionExW
0x42b050 GetFileAttributesA
0x42b054 lstrcpynW
0x42b058 SetConsoleCursorPosition
0x42b05c VerifyVersionInfoA
0x42b060 WritePrivateProfileSectionW
0x42b064 IsBadWritePtr
0x42b068 GetModuleFileNameW
0x42b06c CreateFileW
0x42b070 lstrcatA
0x42b074 GetACP
0x42b078 lstrlenW
0x42b07c FlushFileBuffers
0x42b080 InterlockedExchange
0x42b084 GetCPInfoExW
0x42b088 FillConsoleOutputCharacterW
0x42b08c GetLastError
0x42b090 GetProcAddress
0x42b094 PeekConsoleInputW
0x42b098 EnumDateFormatsExA
0x42b09c CreateTimerQueueTimer
0x42b0a0 LocalLock
0x42b0a4 GetConsoleDisplayMode
0x42b0a8 EnterCriticalSection
0x42b0ac SetTimerQueueTimer
0x42b0b0 GlobalGetAtomNameA
0x42b0b4 WriteConsoleA
0x42b0b8 LocalAlloc
0x42b0bc DnsHostnameToComputerNameA
0x42b0c0 BeginUpdateResourceA
0x42b0c4 GetModuleHandleA
0x42b0c8 HeapSetInformation
0x42b0cc EraseTape
0x42b0d0 GetConsoleTitleW
0x42b0d4 FindFirstVolumeA
0x42b0d8 EndUpdateResourceA
0x42b0dc GetCurrentProcessId
0x42b0e0 AreFileApisANSI
0x42b0e4 LCMapStringW
0x42b0e8 LCMapStringA
0x42b0ec UnhandledExceptionFilter
0x42b0f0 SetUnhandledExceptionFilter
0x42b0f4 HeapAlloc
0x42b0f8 Sleep
0x42b0fc ExitProcess
0x42b100 GetCommandLineA
0x42b104 GetStartupInfoA
0x42b108 RaiseException
0x42b10c RtlUnwind
0x42b110 WriteFile
0x42b114 GetStdHandle
0x42b118 GetModuleFileNameA
0x42b11c TerminateProcess
0x42b120 GetCurrentProcess
0x42b124 IsDebuggerPresent
0x42b128 HeapFree
0x42b12c DeleteCriticalSection
0x42b130 LeaveCriticalSection
0x42b134 VirtualFree
0x42b138 VirtualAlloc
0x42b13c HeapReAlloc
0x42b140 HeapCreate
0x42b144 TlsGetValue
0x42b148 TlsAlloc
0x42b14c TlsSetValue
0x42b150 TlsFree
0x42b154 SetLastError
0x42b158 GetCurrentThreadId
0x42b15c LoadLibraryA
0x42b160 InitializeCriticalSectionAndSpinCount
0x42b164 FreeEnvironmentStringsA
0x42b168 GetEnvironmentStrings
0x42b16c FreeEnvironmentStringsW
0x42b170 WideCharToMultiByte
0x42b174 SetHandleCount
0x42b178 GetFileType
0x42b17c QueryPerformanceCounter
0x42b180 GetTickCount
0x42b184 GetSystemTimeAsFileTime
0x42b188 GetCPInfo
0x42b18c GetOEMCP
0x42b190 IsValidCodePage
0x42b194 HeapSize
0x42b198 GetLocaleInfoA
0x42b19c GetStringTypeA
0x42b1a0 MultiByteToWideChar
0x42b1a4 GetStringTypeW
USER32.dll
0x42b1ac RealGetWindowClassA
EAT(Export Address Table) Library
0x401068 @GetAnotherVice@12
0x401065 @SetFirstEverVice@4
KERNEL32.dll
0x42b000 SetLocalTime
0x42b004 WriteConsoleOutputW
0x42b008 InterlockedIncrement
0x42b00c GetConsoleAliasA
0x42b010 InterlockedDecrement
0x42b014 GetSystemWindowsDirectoryW
0x42b018 SetEnvironmentVariableW
0x42b01c GetEnvironmentStringsW
0x42b020 WaitForSingleObject
0x42b024 GetSystemDefaultLCID
0x42b028 GetModuleHandleW
0x42b02c SetThreadUILanguage
0x42b030 GetConsoleAliasesLengthA
0x42b034 GetCompressedFileSizeW
0x42b038 CreateActCtxW
0x42b03c InitializeCriticalSection
0x42b040 GetConsoleCP
0x42b044 GetSystemDirectoryW
0x42b048 ReadConsoleInputA
0x42b04c GetVersionExW
0x42b050 GetFileAttributesA
0x42b054 lstrcpynW
0x42b058 SetConsoleCursorPosition
0x42b05c VerifyVersionInfoA
0x42b060 WritePrivateProfileSectionW
0x42b064 IsBadWritePtr
0x42b068 GetModuleFileNameW
0x42b06c CreateFileW
0x42b070 lstrcatA
0x42b074 GetACP
0x42b078 lstrlenW
0x42b07c FlushFileBuffers
0x42b080 InterlockedExchange
0x42b084 GetCPInfoExW
0x42b088 FillConsoleOutputCharacterW
0x42b08c GetLastError
0x42b090 GetProcAddress
0x42b094 PeekConsoleInputW
0x42b098 EnumDateFormatsExA
0x42b09c CreateTimerQueueTimer
0x42b0a0 LocalLock
0x42b0a4 GetConsoleDisplayMode
0x42b0a8 EnterCriticalSection
0x42b0ac SetTimerQueueTimer
0x42b0b0 GlobalGetAtomNameA
0x42b0b4 WriteConsoleA
0x42b0b8 LocalAlloc
0x42b0bc DnsHostnameToComputerNameA
0x42b0c0 BeginUpdateResourceA
0x42b0c4 GetModuleHandleA
0x42b0c8 HeapSetInformation
0x42b0cc EraseTape
0x42b0d0 GetConsoleTitleW
0x42b0d4 FindFirstVolumeA
0x42b0d8 EndUpdateResourceA
0x42b0dc GetCurrentProcessId
0x42b0e0 AreFileApisANSI
0x42b0e4 LCMapStringW
0x42b0e8 LCMapStringA
0x42b0ec UnhandledExceptionFilter
0x42b0f0 SetUnhandledExceptionFilter
0x42b0f4 HeapAlloc
0x42b0f8 Sleep
0x42b0fc ExitProcess
0x42b100 GetCommandLineA
0x42b104 GetStartupInfoA
0x42b108 RaiseException
0x42b10c RtlUnwind
0x42b110 WriteFile
0x42b114 GetStdHandle
0x42b118 GetModuleFileNameA
0x42b11c TerminateProcess
0x42b120 GetCurrentProcess
0x42b124 IsDebuggerPresent
0x42b128 HeapFree
0x42b12c DeleteCriticalSection
0x42b130 LeaveCriticalSection
0x42b134 VirtualFree
0x42b138 VirtualAlloc
0x42b13c HeapReAlloc
0x42b140 HeapCreate
0x42b144 TlsGetValue
0x42b148 TlsAlloc
0x42b14c TlsSetValue
0x42b150 TlsFree
0x42b154 SetLastError
0x42b158 GetCurrentThreadId
0x42b15c LoadLibraryA
0x42b160 InitializeCriticalSectionAndSpinCount
0x42b164 FreeEnvironmentStringsA
0x42b168 GetEnvironmentStrings
0x42b16c FreeEnvironmentStringsW
0x42b170 WideCharToMultiByte
0x42b174 SetHandleCount
0x42b178 GetFileType
0x42b17c QueryPerformanceCounter
0x42b180 GetTickCount
0x42b184 GetSystemTimeAsFileTime
0x42b188 GetCPInfo
0x42b18c GetOEMCP
0x42b190 IsValidCodePage
0x42b194 HeapSize
0x42b198 GetLocaleInfoA
0x42b19c GetStringTypeA
0x42b1a0 MultiByteToWideChar
0x42b1a4 GetStringTypeW
USER32.dll
0x42b1ac RealGetWindowClassA
EAT(Export Address Table) Library
0x401068 @GetAnotherVice@12
0x401065 @SetFirstEverVice@4