Report - 4ce5f00cf44673e80fcdb462b15f1ac379c18754900e30ed9d667e8aeb34bd70_demon.dll

Generic Malware PE File DLL PE64
ScreenShot
Created 2023.08.17 16:09 Machine s1_win7_x6401
Filename 4ce5f00cf44673e80fcdb462b15f1ac379c18754900e30ed9d667e8aeb34bd70_demon.dll
Type PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
6
Behavior Score
1.2
ZERO API file : malware
VT API (file) 40 detected (Havoc, malicious, high confidence, Havokiz, Marte, unsafe, Vi2s, confidence, 100%, Attribute, HighConfidence, AGen, score, Ulise, Gencirc, Redcap, zfavz, R002C0DFI23, Detected, ai score=88, taKsxMMX66P, susgen)
md5 c9e6e4d394d7452b79351028c4da0cac
sha256 4ce5f00cf44673e80fcdb462b15f1ac379c18754900e30ed9d667e8aeb34bd70
ssdeep 1536:2go2smHsP4j2e84tApNSkPOdKra0IFPeaoYoW5ud693abCjc2r4:LtHsP4j2ettmSkPOor/8PXoYoW5udg3c
imphash
impfuzzy 3::
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 40 AntiVirus engines on VirusTotal as malicious

Rules (4cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure