Report - minerxd.exe

PE File PE64 ftp
ScreenShot
Created 2023.09.16 14:09 Machine s1_win7_x6403
Filename minerxd.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
1
Behavior Score
2.2
ZERO API file : malware
VT API (file) 46 detected (AIDetectMalware, malicious, high confidence, GenericKD, Artemis, unsafe, Rozena, Vp5q, confidence, 100%, Eldorado, Attribute, HighConfidence, xbeauj, MalwareX, Tzfl, EPACK, Gen2, MulDrop23, Static AI, Suspicious PE, Detected, ai score=83, Wacatac, Malgent, score, CoinMiner, Chgt, R002H0DIF23, kC3zMNTE3QN, Outbreak)
md5 0e9cc5c2145bae2f6ab41f186dac87d1
sha256 0949ed19896c7add471a5caa7fd5018113d602921a185d911f0cbbadb0ce35c8
ssdeep 98304:w8ZEl7sMD+0Jz27AoQDu4oI87ozUUG77J6mzRLmvV7FLcVXaR:w4mgMD+0Jz2cDu4e6mzNmthL+C
imphash 0fdd3d21d2193b717f076a70dfaa659c
impfuzzy 12:YRJRJJoARZqRVPXJHqV0MHHGf5XGXKiEG6eGJwk6lm/GaJqniZJn:8fjBcVK0MGf5XGf6Zykom/GCqiZJn
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (3cnts)

Level Name Description Collection
info ftp_command ftp command binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
172.217.24.238 US GOOGLE 172.217.24.238 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14052c198 DeleteCriticalSection
 0x14052c1a0 EnterCriticalSection
 0x14052c1a8 GetLastError
 0x14052c1b0 InitializeCriticalSection
 0x14052c1b8 LeaveCriticalSection
 0x14052c1c0 SetUnhandledExceptionFilter
 0x14052c1c8 Sleep
 0x14052c1d0 TlsGetValue
 0x14052c1d8 VirtualProtect
 0x14052c1e0 VirtualQuery
msvcrt.dll
 0x14052c1f0 __C_specific_handler
 0x14052c1f8 __getmainargs
 0x14052c200 __initenv
 0x14052c208 __iob_func
 0x14052c210 __set_app_type
 0x14052c218 __setusermatherr
 0x14052c220 _amsg_exit
 0x14052c228 _cexit
 0x14052c230 _commode
 0x14052c238 _fmode
 0x14052c240 _initterm
 0x14052c248 _onexit
 0x14052c250 abort
 0x14052c258 calloc
 0x14052c260 exit
 0x14052c268 fprintf
 0x14052c270 fputs
 0x14052c278 free
 0x14052c280 malloc
 0x14052c288 memset
 0x14052c290 signal
 0x14052c298 strlen
 0x14052c2a0 strncmp
 0x14052c2a8 vfprintf
 0x14052c2b0 wcscat
 0x14052c2b8 wcscpy
 0x14052c2c0 wcslen
 0x14052c2c8 wcsncmp
 0x14052c2d0 wcsstr
 0x14052c2d8 _wcsnicmp
 0x14052c2e0 _wcsicmp

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure