Report - micro.jar

NPKI Malicious Library UPX Malicious Packer PE File OS Processor Check PE32 DLL
ScreenShot
Created 2021.10.19 09:50 Machine s1_win7_x6402
Filename micro.jar
Type Java archive data (JAR)
AI Score Not founds Behavior Score
9.0
ZERO API file : malware
VT API (file) 15 detected (Java, multiple detections, csrvpr, Siggen, SpyAgent, StrRat, Banload, Malicious, score, ai score=89)
md5 b2097471ac7d4e8304a119e815ac5261
sha256 c4acaaf51b789c246dc51d925ee92f8e0af9019da7385b8b4b127fca43fbb81d
ssdeep 1536:ddAewzYpcmCIE7/d8CC9odgo08E1fl3VLIjo1S8mfaEh7FT8VYclwDu2d:zAewzChPWC9oqoENIGS7LNFTPcu6u
imphash
impfuzzy
  Network IP location

Signature (20cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
warning Generates some ICMP traffic
watch Communicates with host for which no DNS query was performed
watch File has been identified by 15 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
watch The process java.exe wrote an executable file to disk
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Resolves a suspicious Top Level Domain (TLD)
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Command line console output was observed
info One or more processes crashed
info Queries for the computername

Rules (8cnts)

Level Name Description Collection
danger NPKI_Zero File included NPKI binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)

Network (11cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://str-master.pw/strigoi/server/ping.php?lid=EX1S-4U37-B1T8-TB2H-0ITG Unknown 147.182.174.188 6509 mailcious
str-master.pw Unknown 147.182.174.188 mailcious
repo1.maven.org US FASTLY 199.232.196.209 clean
github.com KR AMAZON-02 15.164.81.167 mailcious
nightwolf.workisboring.com Unknown clean
github-releases.githubusercontent.com US FASTLY 185.199.108.154 clean
173.209.48.226 CA GTCOMM 173.209.48.226 clean
147.182.174.188 Unknown 147.182.174.188 mailcious
52.78.231.108 KR AMAZON-02 52.78.231.108 malware
185.199.109.154 US FASTLY 185.199.109.154 clean
151.101.24.209 US FASTLY 151.101.24.209 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure