Report - Sjupttbqke.exe

Hide_EXE PE File PE64
ScreenShot
Created 2024.01.20 18:04 Machine s1_win7_x6403
Filename Sjupttbqke.exe
Type PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
AI Score
5
Behavior Score
2.0
ZERO API file : malware
VT API (file) 27 detected (AIDetectMalware, Seraph, malicious, high confidence, score, Infected, unsafe, V7nz, Attribute, HighConfidence, Artemis, RATX, EmbeddedDotNetBinary, Inject4, Detected, Sabsik, KPFQCW, Static AI, Suspicious PE, confidence)
md5 afabc3587df98b14b379e68b532c40d2
sha256 0452dcaafbe9bc6dfee7a44e35738477a4e99a00983593aba7698c4636a5f59c
ssdeep 12288:o0qV5z+HggLmdKr1sDpktbJnFL2C4HqosP+ZyYPx04otGJx9LQ/z34VWrGg5oQ1N:o1Z+HgW+AqDpk9JFL29KotyYl7Jx4Pk
imphash
impfuzzy 3::
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger

Rules (3cnts)

Level Name Description Collection
warning hide_executable_file Hide executable file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) is none

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure