Report - x64.exe

PE64 PE File
ScreenShot
Created 2023.07.31 11:24 Machine s1_win7_x6401
Filename x64.exe
Type PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
AI Score
6
Behavior Score
3.4
ZERO API
VT API (file) 38 detected (Donut, malicious, high confidence, score, Marte, unsafe, Hacktool, Sysdupate, Vz5q, ABRisk, IAVM, Attribute, HighConfidence, R002H01GU23, Agentb, BCVC, DownLoader45, Glupteba, moderate, Redcap, euumj, Detected, ai score=86, CLOUD, PossibleThreat, confidence, 100%)
md5 79a0dbb12842319812690aebfd1ee580
sha256 8949207761f3d09734aa716da1e6c182425bcde2a95dacb3320085f1fe66069c
ssdeep 3072:2Qt7BKF9SdAxgeu9s6Yq/XRwFwxsV3e67Ox9WiMx5WOX2aI663x13E9ixhuwS:2q78FAy3AsO/X4V3p7Oh2JPv6B1vXuwS
imphash
impfuzzy 3::
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Resolves a suspicious Top Level Domain (TLD)
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://group.pro-tokyo.top//OessGdJCJn9/Xeb_xP3CIw/biIFqxf4FK/HOJI1tTjNe/rw= US HOSTWINDS 23.254.204.173
group.pro-tokyo.top US HOSTWINDS 23.254.204.173
23.254.204.173 US HOSTWINDS 23.254.204.173

Suricata ids



Similarity measure (PE file only) - Checking for service failure