Report - 360.exe

PE File PE32
ScreenShot
Created 2021.09.09 09:50 Machine s1_win7_x6402
Filename 360.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
AI Score
10
Behavior Score
6.0
ZERO API file : malware
VT API (file) 53 detected (AIDetect, malware2, malicious, high confidence, Doris, Redosdru, Unsafe, Save, Zlob, Eldorado, Domar, Mikey, hfuc, Farfli, drygpe, FileRepMalware, CLASSIC, R + Mal, PdfExDr, ZEGOST, SM17, GenericRXHG, Static AI, Malicious PE, begpr, ATRAPS, Gen4, ai score=84, ASBOL, score, R158810, GenericRXAA, BScope, Gencirc, GenAsa, yDUr0gAcJT4, Wintrim, ZexaF, jmGfai6arAob, Genetic, confidence, susgen)
md5 4b6041ec1313e10979cbe1d154d87352
sha256 a1619735fbaec9312f45078025ff45630fead8f14509ac0a400dbfd0a922ec17
ssdeep 3072:MQIulEKbfgrauF4fBJyJhNineUpdhE51ddj/:KulEOgeTfWJueLT
imphash 61a4a136dc04168d61755d46bdab4e66
impfuzzy 6:dBJAEHGDzyRlbRmVOZ/EwEyIBMZzYAhAnSyhMdLMKJAm/LLQIYbBnaOAW46PWTXy:VA/DzqYOZ9ZIB59s+mgtLANIeXu/
  Network IP location

Signature (13cnts)

Level Description
danger File has been identified by 53 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a service
notice Creates executable files on the filesystem
notice Foreign language identified in PE resource
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://180.215.215.189/NetSyst81.dll SG BGPNET Global ASN 180.215.215.189 clean
180.215.215.189 SG BGPNET Global ASN 180.215.215.189 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x458a3c LoadLibraryA
 0x458a40 GetProcAddress
 0x458a44 VirtualProtect
 0x458a48 VirtualAlloc
 0x458a4c VirtualFree
 0x458a50 ExitProcess
ADVAPI32.dll
 0x458a58 RegOpenKeyA
COMCTL32.dll
 0x458a60 None
comdlg32.dll
 0x458a68 PrintDlgA
GDI32.dll
 0x458a70 PatBlt
imagehlp.dll
 0x458a78 MakeSureDirectoryPathExists
ole32.dll
 0x458a80 OleInitialize
OLEAUT32.dll
 0x458a88 SysStringLen
oledlg.dll
 0x458a90 None
OLEPRO32.DLL
 0x458a98 None
SHELL32.dll
 0x458aa0 DragFinish
USER32.dll
 0x458aa8 GetDC
WININET.dll
 0x458ab0 InternetOpenA
WINSPOOL.DRV
 0x458ab8 OpenPrinterA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure