Report - Symbloa.dll

PE File DLL PE64
ScreenShot
Created 2023.12.14 19:09 Machine s1_win7_x6401
Filename Symbloa.dll
Type PE32+ executable (DLL) (console) x86-64, for MS Windows
AI Score
3
Behavior Score
1.4
ZERO API file : malware
VT API (file) 21 detected (AIDetectMalware, Malicious, score, unsafe, Kryptik, Vymj, confidence, 100%, Attribute, HighConfidence, high confidence, FileRepMalware, Misc, Meterpreter, nYiZ0bvPHVT, CCAH)
md5 e55eb7a2b596ee04a0789a06b7d55db8
sha256 791a18f606fa2fd23c23369e1c5759b53f9a465c223427a501ae1d81bcdb6f85
ssdeep 3072:YdAFFuKGVbp3MCnmtjPTLkNXSXm1sgIkDHQtoJ1CkSZ+7/uLSuz3T56cr8Q99Bh:Y4nAb2z/kRSdSv5Se43T56crt/Bh
imphash 027d20fa0f5089caad738182acee6a83
impfuzzy 24:QTF8078p8dYJhkfjB+kZjI4liHx91DvlxcqcBZEwL:wn8pv4fN+kNlUx91Dvkqc8A
  Network IP location

Signature (3cnts)

Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks if process is being debugged by a debugger

Rules (3cnts)

Level Name Description Collection
info IsDLL (no description) binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x3bbf5e200 CryptAcquireContextW
 0x3bbf5e208 CryptCreateHash
 0x3bbf5e210 CryptDecrypt
 0x3bbf5e218 CryptDeriveKey
 0x3bbf5e220 CryptDestroyHash
 0x3bbf5e228 CryptDestroyKey
 0x3bbf5e230 CryptHashData
 0x3bbf5e238 CryptReleaseContext
KERNEL32.dll
 0x3bbf5e248 CreateThread
 0x3bbf5e250 DeleteCriticalSection
 0x3bbf5e258 EnterCriticalSection
 0x3bbf5e260 GetLastError
 0x3bbf5e268 InitializeCriticalSection
 0x3bbf5e270 IsDBCSLeadByteEx
 0x3bbf5e278 LeaveCriticalSection
 0x3bbf5e280 MultiByteToWideChar
 0x3bbf5e288 Sleep
 0x3bbf5e290 TlsGetValue
 0x3bbf5e298 VirtualAlloc
 0x3bbf5e2a0 VirtualProtect
 0x3bbf5e2a8 VirtualQuery
 0x3bbf5e2b0 WaitForSingleObject
 0x3bbf5e2b8 WideCharToMultiByte
msvcrt.dll
 0x3bbf5e2c8 ___lc_codepage_func
 0x3bbf5e2d0 ___mb_cur_max_func
 0x3bbf5e2d8 __iob_func
 0x3bbf5e2e0 _amsg_exit
 0x3bbf5e2e8 _errno
 0x3bbf5e2f0 _initterm
 0x3bbf5e2f8 _lock
 0x3bbf5e300 _unlock
 0x3bbf5e308 abort
 0x3bbf5e310 calloc
 0x3bbf5e318 fputc
 0x3bbf5e320 free
 0x3bbf5e328 fwrite
 0x3bbf5e330 localeconv
 0x3bbf5e338 malloc
 0x3bbf5e340 memcpy
 0x3bbf5e348 memset
 0x3bbf5e350 realloc
 0x3bbf5e358 strerror
 0x3bbf5e360 strlen
 0x3bbf5e368 strncmp
 0x3bbf5e370 vfprintf
 0x3bbf5e378 wcslen
USER32.dll
 0x3bbf5e388 MessageBoxA

EAT(Export Address Table) Library

0x3bbf51573 MyExportedFunction


Similarity measure (PE file only) - Checking for service failure