Report - Unpaid month.xll

Generic Malware Malicious Library UPX PE File OS Processor Check PE32 DLL
ScreenShot
Created 2021.11.02 14:39 Machine s1_win7_x6403
Filename Unpaid month.xll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
1.6
ZERO API file : clean
VT API (file) 11 detected (Eldorado, ajhkd, ASMalwS, Wacatac, Malicious, score, g5X2fRf70S8)
md5 aa0bd807de12aa711ec1b6fb34212a10
sha256 0bc59f697a9de5c77c39318361b288e6489c4e0edfc966acfe418bfb22bdc99e
ssdeep 12288:D0Ws7IMtR4yVld8bzbBSreXhgFK/UqWp:D0bdkX1VcL
imphash be710ba34b048ab0098050ccf62e369c
impfuzzy 48:cY9iOsltoXRMCc+pEmM3ij//gja/wTHQL:cYc7ltoXRMCc+pEeVwrQL
  Network IP location

Signature (5cnts)

Level Description
watch File has been identified by 11 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure