Report - Banana.exe

Browser Login Data Stealer UPX Malicious Library ASPack PE File PE32 OS Processor Check DLL
ScreenShot
Created 2023.09.16 14:16 Machine s1_win7_x6402
Filename Banana.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
4.8
ZERO API file : clean
VT API (file) 47 detected (AIDetectMalware, GenericKDZ, malicious, ZexaF, iuW@a40dE@oi, Genus, Eldorado, Attribute, HighConfidence, high confidence, score, Stealerc, TrojanX, moderate, Mystic, ai score=80, Midie, Sabsik, 9TLXQ0, Detected, R600981, BScope, TrojanPSW, unsafe, GdSda, Generic@AI, RDMK, vOsN7+paqE, xxP1j6lrJJw, J3iOUFWmjAo, susgen, Kryptik, confidence)
md5 ab01a5c6d7bd2e1c03a532e1ccd03358
sha256 2c6cce4c2f5838ce81a5000355a0401ca709b1edd662f580cd6e1d42988fdfc6
ssdeep 3072:B9rwPGiSipIi3j9Dh0CxZogdNr1JUhPUQP4SLRm8Z4PqjzCp:/5iSQ10gHePxzCp
imphash 7a83bc8f14d32c8af61627070a00e36a
impfuzzy 24:uYOjjmS1jtubJnc+pl3eDo/CZouCSOovbO9ZivFGMC:FS1jtulc+ppmZ83A2
  Network IP location

Signature (10cnts)

Level Description
danger File has been identified by 47 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
info Checks amount of memory in system

Rules (13cnts)

Level Name Description Collection
danger infoStealer_browser_b_Zero browser info stealer binaries (download)
watch ASPack_Zero ASPack packed file binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://138.201.200.124/loghub/master DE Hetzner Online GmbH 138.201.200.124 clean
138.201.200.124 DE Hetzner Online GmbH 138.201.200.124 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41c000 WriteFile
 0x41c004 GetLastError
 0x41c008 VirtualFree
 0x41c00c VirtualAlloc
 0x41c010 WaitForSingleObject
 0x41c014 CloseHandle
 0x41c018 CreateThread
 0x41c01c WriteConsoleW
 0x41c020 QueryPerformanceCounter
 0x41c024 GetCurrentProcessId
 0x41c028 GetCurrentThreadId
 0x41c02c GetSystemTimeAsFileTime
 0x41c030 InitializeSListHead
 0x41c034 IsDebuggerPresent
 0x41c038 UnhandledExceptionFilter
 0x41c03c SetUnhandledExceptionFilter
 0x41c040 GetStartupInfoW
 0x41c044 IsProcessorFeaturePresent
 0x41c048 GetModuleHandleW
 0x41c04c GetCurrentProcess
 0x41c050 TerminateProcess
 0x41c054 RtlUnwind
 0x41c058 SetLastError
 0x41c05c EnterCriticalSection
 0x41c060 LeaveCriticalSection
 0x41c064 DeleteCriticalSection
 0x41c068 InitializeCriticalSectionAndSpinCount
 0x41c06c TlsAlloc
 0x41c070 TlsGetValue
 0x41c074 TlsSetValue
 0x41c078 TlsFree
 0x41c07c FreeLibrary
 0x41c080 GetProcAddress
 0x41c084 LoadLibraryExW
 0x41c088 EncodePointer
 0x41c08c RaiseException
 0x41c090 GetStdHandle
 0x41c094 GetModuleFileNameW
 0x41c098 ExitProcess
 0x41c09c GetModuleHandleExW
 0x41c0a0 HeapFree
 0x41c0a4 HeapAlloc
 0x41c0a8 HeapReAlloc
 0x41c0ac LCMapStringW
 0x41c0b0 FindClose
 0x41c0b4 FindFirstFileExW
 0x41c0b8 FindNextFileW
 0x41c0bc IsValidCodePage
 0x41c0c0 GetACP
 0x41c0c4 GetOEMCP
 0x41c0c8 GetCPInfo
 0x41c0cc GetCommandLineA
 0x41c0d0 GetCommandLineW
 0x41c0d4 MultiByteToWideChar
 0x41c0d8 WideCharToMultiByte
 0x41c0dc GetEnvironmentStringsW
 0x41c0e0 FreeEnvironmentStringsW
 0x41c0e4 SetStdHandle
 0x41c0e8 GetFileType
 0x41c0ec GetStringTypeW
 0x41c0f0 GetProcessHeap
 0x41c0f4 HeapSize
 0x41c0f8 FlushFileBuffers
 0x41c0fc GetConsoleOutputCP
 0x41c100 GetConsoleMode
 0x41c104 SetFilePointerEx
 0x41c108 CreateFileW
 0x41c10c DecodePointer

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure