Report - verify.exe

PE File PE64
ScreenShot
Created 2023.09.10 09:21 Machine s1_win7_x6401
Filename verify.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
1.6
ZERO API file : malware
VT API (file) 49 detected (Common, Miner, malicious, high confidence, Molotov, Artemis, unsafe, Kryptik, Vs3l, Eldorado, Attribute, HighConfidence, score, CrypterX, FalseSign, Nsmw, zhbwa, Siggen21, SMOKELOADER, YXDIGZ, GenKryptik, Sabsik, XMRig, CCAN, Detected, R571995, ai score=89, GdSda, DisguisedXMRigMiner, YhzrPCllRHI, Krypt, GIIA, confidence)
md5 73e4f82277d7cb23b3a030e140c50fb2
sha256 ba15633c2ad9ad3ce86df9c28ff4273fab06d771eeb10743eb3396449a0262a0
ssdeep 98304:hL65Ij71XKw6poNpWu/CHrCThPiUf1Qe2KaiOS7vQXZvY/k2l213ncb/VUrZWUUK:h57FD/CeTN1OSUtGPo13cqrZWbsj
imphash f7505c167603909b7180406402fef19e
impfuzzy 24:1fPJx+kTdF0tWJd1jIlMblRf5XG6qXZgJkomvlA/Gbtcqc6ZJF:1fPL+kT6kSslJJG6qJgk1vm/GbuqcoF
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 49 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
ppanel.pornsworld.xyz US CLOUDFLARENET 172.67.185.119 clean
pastebin.com US CLOUDFLARENET 104.20.68.143 mailcious
gulf.moneroocean.stream JP AMAZON-02 54.250.156.221 mailcious
172.67.185.119 US CLOUDFLARENET 172.67.185.119 clean
54.250.156.221 JP AMAZON-02 54.250.156.221 clean
104.20.67.143 US CLOUDFLARENET 104.20.67.143 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1409c928c CloseHandle
 0x1409c9294 CreateSemaphoreW
 0x1409c929c DeleteCriticalSection
 0x1409c92a4 EnterCriticalSection
 0x1409c92ac GetCurrentThreadId
 0x1409c92b4 GetLastError
 0x1409c92bc GetStartupInfoA
 0x1409c92c4 InitializeCriticalSection
 0x1409c92cc IsDBCSLeadByteEx
 0x1409c92d4 LeaveCriticalSection
 0x1409c92dc MultiByteToWideChar
 0x1409c92e4 RaiseException
 0x1409c92ec ReleaseSemaphore
 0x1409c92f4 RtlCaptureContext
 0x1409c92fc RtlLookupFunctionEntry
 0x1409c9304 RtlUnwindEx
 0x1409c930c RtlVirtualUnwind
 0x1409c9314 SetLastError
 0x1409c931c SetUnhandledExceptionFilter
 0x1409c9324 Sleep
 0x1409c932c TlsAlloc
 0x1409c9334 TlsFree
 0x1409c933c TlsGetValue
 0x1409c9344 TlsSetValue
 0x1409c934c VirtualProtect
 0x1409c9354 VirtualQuery
 0x1409c935c WaitForSingleObject
 0x1409c9364 WideCharToMultiByte
msvcrt.dll
 0x1409c9374 __C_specific_handler
 0x1409c937c ___lc_codepage_func
 0x1409c9384 ___mb_cur_max_func
 0x1409c938c __getmainargs
 0x1409c9394 __initenv
 0x1409c939c __iob_func
 0x1409c93a4 __set_app_type
 0x1409c93ac __setusermatherr
 0x1409c93b4 _acmdln
 0x1409c93bc _amsg_exit
 0x1409c93c4 _cexit
 0x1409c93cc _commode
 0x1409c93d4 _errno
 0x1409c93dc _fmode
 0x1409c93e4 _initterm
 0x1409c93ec _onexit
 0x1409c93f4 _wcsicmp
 0x1409c93fc _wcsnicmp
 0x1409c9404 abort
 0x1409c940c calloc
 0x1409c9414 exit
 0x1409c941c fprintf
 0x1409c9424 fputc
 0x1409c942c fputs
 0x1409c9434 fputwc
 0x1409c943c free
 0x1409c9444 fwprintf
 0x1409c944c fwrite
 0x1409c9454 localeconv
 0x1409c945c malloc
 0x1409c9464 memcpy
 0x1409c946c memset
 0x1409c9474 realloc
 0x1409c947c signal
 0x1409c9484 strcmp
 0x1409c948c strerror
 0x1409c9494 strlen
 0x1409c949c strncmp
 0x1409c94a4 vfprintf
 0x1409c94ac wcscat
 0x1409c94b4 wcscpy
 0x1409c94bc wcslen
 0x1409c94c4 wcsncmp
 0x1409c94cc wcsstr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure