ScreenShot
Created | 2022.05.20 13:44 | Machine | s1_win7_x6401 |
Filename | Polution_v0.7b_windows_64.exe | ||
Type | PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 51 detected (TikpaBenQ, BroPass, malicious, moderate confidence, GenericKD, Trojanpws, Artemis, Unsafe, Save, confidence, 100%, TrojanPSW, Eldorado, a variant of Generik, IRYLUBP, R002C0WD722, FileRepMalware, qqpass, Qqrob, Ecle, Malware@#1ayiq4c2kgsos, MulDrop20, GenKD, Redcap, qwrvp, ai score=83, PSWTroj, kcloud, TrickBot, Tiggre, score, WinGo, CLOUD, pCaOOizfod8, susgen, Behavior) | ||
md5 | 1dcaed15ea8d428bf34e413f686ba904 | ||
sha256 | 3d65c7d952d9799825669302c0aa7a9c621796acfe0c29c46ba2d74cb8fb9dcd | ||
ssdeep | 98304:xZU/fpnfFTZXBGlDzrHYpQlSWi1fsbs4N75C5KOQOSCP2xmyMw7L:xoNI9X4SlSN1EbbWpQOSChO7L | ||
imphash | 9aebf3da4677af9275c461261e5abde3 | ||
impfuzzy | 3:swBJAEPw1MO/OywS9KTXzhAXwEQaxRGUq:dBJAEoZ/OEGDzyRs |
Network IP location
Signature (12cnts)
Level | Description |
---|---|
danger | File has been identified by 51 AntiVirus engines on VirusTotal as malicious |
watch | Detects the presence of Wine emulator |
notice | A process created a hidden window |
notice | Creates a suspicious process |
notice | Executes one or more WMI queries |
notice | Steals private information from local Internet browsers |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is compressed using UPX |
notice | Uses Windows utilities for basic Windows functionality |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | Queries for the computername |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | IsPE64 | (no description) | binaries (download) |
info | IsPE64 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.DLL
0x11c803c LoadLibraryA
0x11c8044 ExitProcess
0x11c804c GetProcAddress
0x11c8054 VirtualProtect
msvcrt.dll
0x11c8064 exit
EAT(Export Address Table) is none
KERNEL32.DLL
0x11c803c LoadLibraryA
0x11c8044 ExitProcess
0x11c804c GetProcAddress
0x11c8054 VirtualProtect
msvcrt.dll
0x11c8064 exit
EAT(Export Address Table) is none