Report - clp8.exe

PE File PE32
ScreenShot
Created 2023.09.10 17:08 Machine s1_win7_x6403
Filename clp8.exe
Type PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
AI Score
4
Behavior Score
2.2
ZERO API file : malware
VT API (file) 35 detected (AIDetectMalware, Babar, Save, malicious, confidence, moderate confidence, GenKryptik, GNOV, score, Tasker, azrd, CrypterX, Kryptik, cbgfl, R03BC0XI923, moderate, Sabsik, Artemis, ai score=85, CLOUD, Static AI, Malicious PE, susgen, ZexaF, @pMfa8vjDnni)
md5 97325593f51f6ac58bfd2983c98da85e
sha256 bdd9226e47b60c21d1bdfc794e223d1f52b9f67441e5d021fc5f9f463fb4125e
ssdeep 98304:VXI+UKBIPs2VEJ1ki3smtma78CSj40CI4kIXLG3M/myLow8AS:eKBIkZJ1k6URVI0mdLXF
imphash 829c09b185702c1f62f61f818604057c
impfuzzy 3:swBJAEPw1MO/OywS9KTXzhAXwEQaxRegw9Xn:dBJAEoZ/OEGDzyRziX
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
info Checks if process is being debugged by a debugger
info The executable uses a known packer

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x1009894 LoadLibraryA
 0x1009898 ExitProcess
 0x100989c GetProcAddress
 0x10098a0 VirtualProtect
USER32.dll
 0x10098a8 SetTimer

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure