Report - SalmonFlora.exe

VMProtect Malicious Library PE File PE32
ScreenShot
Created 2021.10.01 09:47 Machine s1_win7_x6401
Filename SalmonFlora.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
2
Behavior Score
2.6
ZERO API file : malware
VT API (file) 36 detected (AIDetect, malware2, malicious, high confidence, EasyRansom, Artemis, Unsafe, Save, VMProtBad, confidence, ZexaF, @FW@aCEvxlii, Attribute, HighConfidence, Static AI, Malicious PE, AGEN, Tnega, score, ai score=80, Generic@ML, RDML, 547ujYJ3WIZLAnkiwiodgQ, ADER, susgen)
md5 e277207bfd455a387fe52aaa65f4e9b0
sha256 a4c3d60102ff72d89963df742fd50a4b7dc32a23ea3cf7a78dd3a4685397d270
ssdeep 98304:J0lzpavFrqTjdroC9Sjt99e4ZSF9pFPHlzbQCY:gFmadoDg4Zs979Q
imphash 5cc235dd606b429af749bcc4d7982503
impfuzzy 12:9OKR3cyVnSSWihQ5kBZGoQtXJxZGb9AJcDfA5kLfP9m:9O3ASSWihQ58QtXJHc9NDI5Q8
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info Checks amount of memory in system
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x74f000 DeleteFileA
ADVAPI32.dll
 0x74f008 SetServiceStatus
ole32.dll
 0x74f010 CoUninitialize
USERENV.dll
 0x74f018 CreateEnvironmentBlock
WTSAPI32.dll
 0x74f020 WTSQueryUserToken
WININET.dll
 0x74f028 DeleteUrlCacheEntry
urlmon.dll
 0x74f030 URLDownloadToFileA
PSAPI.DLL
 0x74f038 EnumProcesses
WTSAPI32.dll
 0x74f040 WTSSendMessageW
KERNEL32.dll
 0x74f048 VirtualQuery
USER32.dll
 0x74f050 GetProcessWindowStation
KERNEL32.dll
 0x74f058 LocalAlloc
 0x74f05c LocalFree
 0x74f060 GetModuleFileNameW
 0x74f064 GetProcessAffinityMask
 0x74f068 SetProcessAffinityMask
 0x74f06c SetThreadAffinityMask
 0x74f070 Sleep
 0x74f074 ExitProcess
 0x74f078 FreeLibrary
 0x74f07c LoadLibraryA
 0x74f080 GetModuleHandleA
 0x74f084 GetProcAddress
USER32.dll
 0x74f08c GetProcessWindowStation
 0x74f090 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure