Report - rlmp32wlve.dll

DLL PE File PE32
ScreenShot
Created 2023.03.06 17:51 Machine s1_win7_x6401
Filename rlmp32wlve.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
4.0
ZERO API file : clean
VT API (file)
md5 ab947bfaa5ae4bff95661edd82950478
sha256 48c92d1a85d78d3dd125661f97f5eeda5f3a137d2f78a33c5a7b74b01b50a49f
ssdeep 24576:0w3IqhBQzWQOjHeVIgo6KVRLoXKx7fEAbOM5HCNAGT7oBFW:0mIWXPjHeVIgrKVRLoaT/b5c7oB
imphash 5774734b3f34bc8eabac3f454f2a6852
impfuzzy 3:sU9KTXzhAXwWBJAEPwEBJJ67EGVzxrWq9TdTiEJeARLMabT:HGDYBJAEtmVzZv3iET46T
  Network IP location

Signature (11cnts)

Level Description
watch A process performed obfuscation on information about the computer or sent it to a remote location indicative of CnC Traffic/Preperations.
watch Checks for the presence of known devices from debuggers and forensic tools
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://nerf-0148-unknown.guru/bot/regex RU Psk-set LLC 79.137.195.205 clean
http://nerf-0148-unknown.guru/bot/online?guid=TEST22-PC\\test22&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 RU Psk-set LLC 79.137.195.205 clean
nerf-0148-unknown.guru RU Psk-set LLC 79.137.195.205 clean
79.137.195.205 RU Psk-set LLC 79.137.195.205 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x10038064 GetProcAddress
 0x10038068 LoadLibraryA
 0x1003806c VirtualAlloc
 0x10038070 VirtualFree
USER32.dll
 0x10038078 EmptyClipboard
ADVAPI32.dll
 0x10038080 GetUserNameA
WININET.dll
 0x10038088 InternetConnectA

EAT(Export Address Table) Library

0x100026d0 Entry


Similarity measure (PE file only) - Checking for service failure