ScreenShot
Created | 2021.10.07 18:11 | Machine | s1_win7_x6402 |
Filename | md7_7dfj.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows, PECompact2 compressed | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 18 detected (AIDetect, malware2, Artemis, Unsafe, Attribute, HighConfidence, Malicious, Passteal, DownLoader43, Phonzy, Predator, 6C8JSB, ZexaF, io0aaqYZPJm, TrojanX) | ||
md5 | 0122c6b7f2509a0eec1b39c8689bee86 | ||
sha256 | 9f72ad74c30a5ea4ead990fc8d9e395178a3c100dc5bcc098991fe3b23b02273 | ||
ssdeep | 49152:pwcOZfYiqG4rT1/0jyh1KsyYL0XnvSX3l:p+jqG4N/0jUKiL0XqX3l | ||
imphash | 09d0478591d4f788cb3e5ea416c25237 | ||
impfuzzy | 3:swBJAEPwS9KTXzhAXwEBJJ67EGVn:dBJAEHGDymVn |
Network IP location
Signature (14cnts)
Level | Description |
---|---|
watch | Communicates with host for which no DNS query was performed |
watch | Disables proxy possibly for traffic interception |
watch | File has been identified by 18 AntiVirus engines on VirusTotal as malicious |
watch | Modifies proxy override settings possibly for traffic interception |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Foreign language identified in PE resource |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Steals private information from local Internet browsers |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | Checks amount of memory in system |
info | One or more processes crashed |
info | The executable uses a known packer |
info | The file contains an unknown PE resource name possibly indicative of a packer |
Rules (2cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (5cnts) ?
Suricata ids
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
PE API
IAT(Import Address Table) Library
kernel32.dll
0x9a8200 LoadLibraryA
0x9a8204 GetProcAddress
0x9a8208 VirtualAlloc
0x9a820c VirtualFree
EAT(Export Address Table) is none
kernel32.dll
0x9a8200 LoadLibraryA
0x9a8204 GetProcAddress
0x9a8208 VirtualAlloc
0x9a820c VirtualFree
EAT(Export Address Table) is none