ScreenShot
Created | 2021.08.23 19:09 | Machine | s1_win7_x6403 |
Filename | r.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 42 detected (AIDetect, malware1, malicious, high confidence, Razy, FormBook, Save, confidence, 100%, Eldorado, Noon, ccmw, Generic@ML, RDML, xeCJFy2NbGuVE+e7Bw, A + Troj, Siggen9, VirRansom, XPACK, Gen2, score, R431880, GenericRXLS, ai score=81, BScope, TrojanPSW, Unsafe, Static AI, Malicious PE, susgen, GenKryptik, AYEB, ZexaF, keX@aWMnjMe) | ||
md5 | 305c02b6842f5b81a6fa7a2aab07b00e | ||
sha256 | 47fda47985cd25b0810445d6e35b3007d3e56c8015ce7d000f850ba1c333ffa7 | ||
ssdeep | 3072:6icBig6z0HHDfM4ocAF4mf4gjDKOO9HQ13WOwz4z412s7lw:6iFKLNoco5ggjeOO9w13XLz412s7O | ||
imphash | |||
impfuzzy | 3:: |
Network IP location
Signature (7cnts)
Level | Description |
---|---|
danger | File has been identified by 42 AntiVirus engines on VirusTotal as malicious |
warning | Generates some ICMP traffic |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | Win_Trojan_Formbook_Zero | Used Formbook | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (39cnts) ?
Suricata ids
ET MALWARE FormBook CnC Checkin (GET)
PE API
IAT(Import Address Table) is none
EAT(Export Address Table) is none
EAT(Export Address Table) is none