Report - lipster.exe

Generic Malware UPX Malicious Library PE File PE32
ScreenShot
Created 2021.08.20 09:36 Machine s1_win7_x6402
Filename lipster.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
1
Behavior Score
2.4
ZERO API file : malware
VT API (file) 49 detected (AIDetect, malware2, malicious, high confidence, Siggen3, GenericKD, Unsafe, Save, confidence, 100%, Kryptik, ZexaF, pq0@aqWjjopi, Eldorado, Attribute, HighConfidence, HMDS, TrojanX, Ljud, A + Troj, Krypt, HPGen, Emotet, Score, RedLineSteal, iyczb, kcloud, Azorult, NetSteal, HW7Y0T, BScope, Blocker, ai score=84, CLASSIC, Static AI, Suspicious PE, susgen, GenKryptik, FJEX, Genetic, HwoCXQAA)
md5 35878c80b3957a04c99270e45d66f3cc
sha256 b55704fa2fb3db346332e5cfa37a04628a2ac747184e4104c929704eb4b5b2b4
ssdeep 3072:w+pHi9bPhpasaKBMjUAzgCEkk9dADb/rXKFmgploIDbLhYLCfZzENRjt7/v8KT0X:lJiJPhpahKyNZeq/rXKF97xiqAl/7
imphash d14e6f286b56e073587d660c9cc6ef7f
impfuzzy 24:CbkDwu9ErjtZ8XBkrkRri/xEIOV4FndcKcDS1+pX86+chgYDttoLOovEGb2cwSJW:cZ8Xef/5ndH1KAMgYDtto6VGacTvv0wU
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 49 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x42b000 SetLocalTime
 0x42b004 WriteConsoleOutputW
 0x42b008 InterlockedIncrement
 0x42b00c GetConsoleAliasA
 0x42b010 InterlockedDecrement
 0x42b014 GetSystemWindowsDirectoryW
 0x42b018 SetEnvironmentVariableW
 0x42b01c GetEnvironmentStringsW
 0x42b020 WaitForSingleObject
 0x42b024 GetSystemDefaultLCID
 0x42b028 GetModuleHandleW
 0x42b02c SetThreadUILanguage
 0x42b030 GetConsoleAliasesLengthA
 0x42b034 GetCompressedFileSizeW
 0x42b038 CreateActCtxW
 0x42b03c InitializeCriticalSection
 0x42b040 GetConsoleCP
 0x42b044 GetSystemDirectoryW
 0x42b048 ReadConsoleInputA
 0x42b04c GetVersionExW
 0x42b050 GetFileAttributesA
 0x42b054 lstrcpynW
 0x42b058 SetConsoleCursorPosition
 0x42b05c VerifyVersionInfoA
 0x42b060 WritePrivateProfileSectionW
 0x42b064 IsBadWritePtr
 0x42b068 GetModuleFileNameW
 0x42b06c CreateFileW
 0x42b070 lstrcatA
 0x42b074 GetACP
 0x42b078 lstrlenW
 0x42b07c FlushFileBuffers
 0x42b080 InterlockedExchange
 0x42b084 GetCPInfoExW
 0x42b088 FillConsoleOutputCharacterW
 0x42b08c GetLastError
 0x42b090 GetProcAddress
 0x42b094 PeekConsoleInputW
 0x42b098 EnumDateFormatsExA
 0x42b09c CreateTimerQueueTimer
 0x42b0a0 LocalLock
 0x42b0a4 GetConsoleDisplayMode
 0x42b0a8 EnterCriticalSection
 0x42b0ac SetTimerQueueTimer
 0x42b0b0 GlobalGetAtomNameA
 0x42b0b4 WriteConsoleA
 0x42b0b8 LocalAlloc
 0x42b0bc DnsHostnameToComputerNameA
 0x42b0c0 BeginUpdateResourceA
 0x42b0c4 GetModuleHandleA
 0x42b0c8 HeapSetInformation
 0x42b0cc EraseTape
 0x42b0d0 GetConsoleTitleW
 0x42b0d4 FindFirstVolumeA
 0x42b0d8 EndUpdateResourceA
 0x42b0dc GetCurrentProcessId
 0x42b0e0 AreFileApisANSI
 0x42b0e4 LCMapStringW
 0x42b0e8 LCMapStringA
 0x42b0ec UnhandledExceptionFilter
 0x42b0f0 SetUnhandledExceptionFilter
 0x42b0f4 HeapAlloc
 0x42b0f8 Sleep
 0x42b0fc ExitProcess
 0x42b100 GetCommandLineA
 0x42b104 GetStartupInfoA
 0x42b108 RaiseException
 0x42b10c RtlUnwind
 0x42b110 WriteFile
 0x42b114 GetStdHandle
 0x42b118 GetModuleFileNameA
 0x42b11c TerminateProcess
 0x42b120 GetCurrentProcess
 0x42b124 IsDebuggerPresent
 0x42b128 HeapFree
 0x42b12c DeleteCriticalSection
 0x42b130 LeaveCriticalSection
 0x42b134 VirtualFree
 0x42b138 VirtualAlloc
 0x42b13c HeapReAlloc
 0x42b140 HeapCreate
 0x42b144 TlsGetValue
 0x42b148 TlsAlloc
 0x42b14c TlsSetValue
 0x42b150 TlsFree
 0x42b154 SetLastError
 0x42b158 GetCurrentThreadId
 0x42b15c LoadLibraryA
 0x42b160 InitializeCriticalSectionAndSpinCount
 0x42b164 FreeEnvironmentStringsA
 0x42b168 GetEnvironmentStrings
 0x42b16c FreeEnvironmentStringsW
 0x42b170 WideCharToMultiByte
 0x42b174 SetHandleCount
 0x42b178 GetFileType
 0x42b17c QueryPerformanceCounter
 0x42b180 GetTickCount
 0x42b184 GetSystemTimeAsFileTime
 0x42b188 GetCPInfo
 0x42b18c GetOEMCP
 0x42b190 IsValidCodePage
 0x42b194 HeapSize
 0x42b198 GetLocaleInfoA
 0x42b19c GetStringTypeA
 0x42b1a0 MultiByteToWideChar
 0x42b1a4 GetStringTypeW
USER32.dll
 0x42b1ac RealGetWindowClassA

EAT(Export Address Table) Library

0x401068 @GetAnotherVice@12
0x401065 @SetFirstEverVice@4


Similarity measure (PE file only) - Checking for service failure