Report - rubber.exe

UPX Malicious Library Malicious Packer PE32 PE File
ScreenShot
Created 2023.04.03 13:43 Machine s1_win7_x6403
Filename rubber.exe
Type PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
3
Behavior Score
4.4
ZERO API file : clean
VT API (file) 20 detected (Malicious, score, Save, confidence, Ursu, Generic@AI, RDMK, cmRtazrJHWV7KTNq69naZFistF1k, AGEN, Detected, ai score=81, BScope, Gorsh, WinGo, Runner)
md5 afac69dd87bbf4bd13adb1180cfd486f
sha256 186171f3b0b6e53f52e63195368b5f90531c22410b912c828e9b506b0f3429b7
ssdeep 24576:q5KIWGEec6BcadqZODhnQI+zK4DnB2mNLqJ4UPk4a9SKOgst8anFYXF0+xJv3E4a:oS8+HZU+Xnl0ePsuYII1XRL0D
imphash 1cd364a9e949d5ecebd6c614e64bc545
impfuzzy 12:5ObVj7NkOREXPXJHeOAThTAqAGIR6kW0mDruMzTZGHrYXOeUP:UbVjhkO+VuTdLS6kNmDruMztir6UP
  Network IP location

Signature (8cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
notice The binary likely contains encrypted or compressed data indicative of a packer
info Command line console output was observed
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
161.97.160.16 DE Contabo GmbH 161.97.160.16 clean

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x55c020 WriteFile
 0x55c024 WriteConsoleW
 0x55c028 WaitForMultipleObjects
 0x55c02c WaitForSingleObject
 0x55c030 VirtualQuery
 0x55c034 VirtualFree
 0x55c038 VirtualAlloc
 0x55c03c SwitchToThread
 0x55c040 SetWaitableTimer
 0x55c044 SetUnhandledExceptionFilter
 0x55c048 SetProcessPriorityBoost
 0x55c04c SetEvent
 0x55c050 SetErrorMode
 0x55c054 SetConsoleCtrlHandler
 0x55c058 LoadLibraryA
 0x55c05c LoadLibraryW
 0x55c060 GetSystemInfo
 0x55c064 GetSystemDirectoryA
 0x55c068 GetStdHandle
 0x55c06c GetQueuedCompletionStatus
 0x55c070 GetProcessAffinityMask
 0x55c074 GetProcAddress
 0x55c078 GetEnvironmentStringsW
 0x55c07c GetConsoleMode
 0x55c080 FreeEnvironmentStringsW
 0x55c084 ExitProcess
 0x55c088 DuplicateHandle
 0x55c08c CreateThread
 0x55c090 CreateIoCompletionPort
 0x55c094 CreateEventA
 0x55c098 CloseHandle
 0x55c09c AddVectoredExceptionHandler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure