Report - LEMMIN.exe

Malicious Library PE File PE64
ScreenShot
Created 2023.03.09 17:42 Machine s1_win7_x6403
Filename LEMMIN.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
3
Behavior Score
1.4
ZERO API file : malware
VT API (file) 31 detected (Tedy, malicious, confidence, Eldorado, Attribute, HighConfidence, high confidence, Kryptik, score, Trojanx, Miner, lfoz, AGEN, CoinMiner, Detected, ai score=80, mJL08voCrEL, susgen, AGENMM)
md5 38aad33a1f0f90c4294abab2a85221eb
sha256 1a72fe969226e84373bd29a8caefc5e46478f550662f2d55c889ffc0a580b491
ssdeep 98304:hXRMxYUKJxO28EJuhT8VArZfrYUyYOep+KM7:wYUK/O2k3VfZxOep+Kk
imphash c24ea937b2b0d62e829e8a8faeff5a8d
impfuzzy 24:Dfjz+kQYJd1j9Mblif5XGTqqXZPFkomtcqcxvZJF:DfH+kXHslEJGTqqJdk1uqcxLF
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 31 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
xmr.2miners.com Unknown 162.19.139.184 mailcious
162.19.139.184 Unknown 162.19.139.184 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14038e254 CreateSemaphoreW
 0x14038e25c DeleteCriticalSection
 0x14038e264 EnterCriticalSection
 0x14038e26c GetLastError
 0x14038e274 GetModuleFileNameW
 0x14038e27c GetStartupInfoW
 0x14038e284 InitializeCriticalSection
 0x14038e28c IsDBCSLeadByteEx
 0x14038e294 LeaveCriticalSection
 0x14038e29c MultiByteToWideChar
 0x14038e2a4 ReleaseSemaphore
 0x14038e2ac SetLastError
 0x14038e2b4 SetUnhandledExceptionFilter
 0x14038e2bc Sleep
 0x14038e2c4 TlsAlloc
 0x14038e2cc TlsFree
 0x14038e2d4 TlsGetValue
 0x14038e2dc TlsSetValue
 0x14038e2e4 VirtualProtect
 0x14038e2ec VirtualQuery
 0x14038e2f4 WaitForSingleObject
msvcrt.dll
 0x14038e304 __C_specific_handler
 0x14038e30c ___lc_codepage_func
 0x14038e314 ___mb_cur_max_func
 0x14038e31c __iob_func
 0x14038e324 __set_app_type
 0x14038e32c __setusermatherr
 0x14038e334 __wgetmainargs
 0x14038e33c __winitenv
 0x14038e344 _amsg_exit
 0x14038e34c _assert
 0x14038e354 _cexit
 0x14038e35c _commode
 0x14038e364 _errno
 0x14038e36c _fmode
 0x14038e374 _initterm
 0x14038e37c _onexit
 0x14038e384 _wcmdln
 0x14038e38c _wcsicmp
 0x14038e394 _wgetenv
 0x14038e39c abort
 0x14038e3a4 calloc
 0x14038e3ac exit
 0x14038e3b4 fprintf
 0x14038e3bc fputwc
 0x14038e3c4 free
 0x14038e3cc fwprintf
 0x14038e3d4 fwrite
 0x14038e3dc localeconv
 0x14038e3e4 malloc
 0x14038e3ec memcpy
 0x14038e3f4 memset
 0x14038e3fc realloc
 0x14038e404 signal
 0x14038e40c strcat
 0x14038e414 strerror
 0x14038e41c strlen
 0x14038e424 strncmp
 0x14038e42c strstr
 0x14038e434 vfprintf
 0x14038e43c wcscat
 0x14038e444 wcscpy
 0x14038e44c wcslen
 0x14038e454 wcsncmp
 0x14038e45c wcsstr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure