Report - xboyxVersionxx.txt

UPX Malicious Library Malicious Packer OS Processor Check DLL PE64 PE File
ScreenShot
Created 2023.05.16 07:33 Machine s1_win7_x6401
Filename xboyxVersionxx.txt
Type PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
AI Score
2
Behavior Score
1.0
ZERO API file : clean
VT API (file) 28 detected (Vvva, malicious, confidence, Attribute, HighConfidence, moderate confidence, GenKryptik, AGen, Donut, ai score=86, Wacatac, GenericKD, unsafe, R002H0DED23, Kryptik, CLOUD)
md5 9e97c6197f0e42fae10fdb58559d0add
sha256 0f7f71f457a1b7d8e34d100bb6d069ed0428616a1f8d4cb6056c4729aa2dcb24
ssdeep 12288:mKjjaLbtlkshIGwEgyMV1nAbRFmv93luorkENp3DTX3BXiQlqpW:d+HwsheEhEnAbRm3r/pTj1iQN
imphash 26b6088781ced742882895f2339d19ad
impfuzzy 12:YRJR+hXgxZnJE6iiARZqRuFbhMzEFpPXJNiXJ47VsEO3:8f5JE3nc+b6zEbegVs3
  Network IP location

Signature (2cnts)

Level Description
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (7cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure