Report - redline1234.exe

PE File PE64
ScreenShot
Created 2024.01.28 10:00 Machine s1_win7_x6401
Filename redline1234.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
12
Behavior Score
1.8
ZERO API file : malware
VT API (file) 36 detected (AIDetectMalware, Malicious, score, Tedy, Attribute, HighConfidence, Kryptik, Miner, puXfYWFTsfG, Krypt, Detected, ai score=88, GenKryptik, CoinMiner, Eldorado, DropperX, R622355, OScope, susgen, GQCB, confidence)
md5 5dec9f02f7067194f9928e37ed05c8f6
sha256 dfecb99cc255e99b5df34a042f0585c0e8458a4e0075e7d513d2c0b492c41806
ssdeep 49152:A0jhMlqDbsynliN2InCFvy0l2aMEBLWw/3Ry0rP3Fga/EO7xhbAIXdTBpox:QyliNjnCFvxMEWw/hy0bFga/d7vbASB2
imphash de41d4e0545d977de6ca665131bb479a
impfuzzy 12:FMHHGf5XGXKiEG6eGJyJk6lTpJq/iZJAgRJRJJoARZqRVPXJHqc:FMGf5XGf6ZgJkoDq6ZJ9fjBcV9
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
pool.hashvault.pro SG PhoenixNAP 131.153.76.130 mailcious
163.5.215.245 FR Epitech 163.5.215.245 clean
125.253.92.50 AU FireNet Pty Ltd 125.253.92.50 clean

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x1400091b0 __C_specific_handler
 0x1400091b8 __getmainargs
 0x1400091c0 __initenv
 0x1400091c8 __iob_func
 0x1400091d0 __set_app_type
 0x1400091d8 __setusermatherr
 0x1400091e0 _amsg_exit
 0x1400091e8 _cexit
 0x1400091f0 _commode
 0x1400091f8 _fmode
 0x140009200 _initterm
 0x140009208 _onexit
 0x140009210 _wcsicmp
 0x140009218 _wcsnicmp
 0x140009220 abort
 0x140009228 calloc
 0x140009230 exit
 0x140009238 fprintf
 0x140009240 free
 0x140009248 fwrite
 0x140009250 malloc
 0x140009258 memcpy
 0x140009260 memset
 0x140009268 signal
 0x140009270 strlen
 0x140009278 strncmp
 0x140009280 vfprintf
 0x140009288 wcscat
 0x140009290 wcscpy
 0x140009298 wcslen
 0x1400092a0 wcsncmp
KERNEL32.dll
 0x1400092b0 DeleteCriticalSection
 0x1400092b8 EnterCriticalSection
 0x1400092c0 GetLastError
 0x1400092c8 InitializeCriticalSection
 0x1400092d0 LeaveCriticalSection
 0x1400092d8 SetUnhandledExceptionFilter
 0x1400092e0 Sleep
 0x1400092e8 TlsGetValue
 0x1400092f0 VirtualProtect
 0x1400092f8 VirtualQuery

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure