Report - 23.exe

Generic Malware PE64 PE File
ScreenShot
Created 2021.11.02 11:46 Machine s1_win7_x6403
Filename 23.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
1.2
ZERO API file : clean
VT API (file) 28 detected (malicious, high confidence, GenericKDZ, GenericRXAA, Unsafe, Eldorado, Donut, Gencirc, InjectNET, ASMalwS, kcloud, Sabsik, score, R444976, ai score=87)
md5 e7287d94a2212da20e7e574102851645
sha256 18b8e1c2e9ff5a99e6d36b91d1958a2458653e639214fcb5111ed13d87dc038a
ssdeep 49152:ZlC2s4HDR9YPPWZ5VbsdpKdoqHhkB4R6l4i0v4X8cY0KvmFwEAc:Z9scRWwVsfqHhk06lvZscMvVc
imphash 02549ff92b49cce693542fc9afb10102
impfuzzy 6:HMJqX0syYJxSBS0H5sD4sIWvXoFliPEcn:sJqGMY58E6PXn
  Network IP location

Signature (2cnts)

Level Description
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (3cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x5f396c malloc
 0x5f3974 memset
 0x5f397c _get_pgmptr
 0x5f3984 getenv
 0x5f398c sprintf
 0x5f3994 __argc
 0x5f399c __argv
 0x5f39a4 _environ
 0x5f39ac _XcptFilter
 0x5f39b4 __set_app_type
 0x5f39bc _controlfp
 0x5f39c4 __getmainargs
 0x5f39cc exit
kernel32.dll
 0x5f39dc Sleep
 0x5f39e4 CreateProcessA
 0x5f39ec SetUnhandledExceptionFilter

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure