ScreenShot
Created | 2021.10.08 08:24 | Machine | s1_win7_x6402 |
Filename | trehjugdr4et6u.msi | ||
Type | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code pa | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 4 detected (Ruby) | ||
md5 | 065e70c3b1e6841074a25aafa95e20bd | ||
sha256 | a69d27abd043cc676095f71300bf6b2368167536fcd4fe5342cf79a7e94fc2fe | ||
ssdeep | 12288:oC3LUk7ftIXeWc5ie52YOqhPS+KP/w1pZGGgCs5xu8Z:ofaFAeWceYHPS3PIoA4xu | ||
imphash | |||
impfuzzy |
Network IP location
Signature (9cnts)
Level | Description |
---|---|
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | File has been identified by 4 AntiVirus engines on VirusTotal as malicious |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Queries for the computername |
Rules (1cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | Microsoft_Office_File_Zero | Microsoft Office File | binaries (upload) |
Network (5cnts) ?
Suricata ids
ET MALWARE MirrorBlast CnC Activity M3
ET USER_AGENTS Suspicious User-Agent (REBOL)
ET MALWARE MirrorBlast CnC Activity M2
ET USER_AGENTS Suspicious User-Agent (REBOL)
ET MALWARE MirrorBlast CnC Activity M2