ScreenShot
Created | 2024.03.28 07:56 | Machine | s1_win7_x6403 |
Filename | amaa.exe | ||
Type | PE32 executable (console) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 43 detected (AIDetectMalware, Penguish, malicious, high confidence, score, unsafe, Attribute, HighConfidence, GenKryptik, GURY, Generic@AI, RDML, xy8CjcmF3KH6vP6OApMYbw, lwztf, LUMMASTEALER, YXECZZ, Krypt, Detected, ai score=80, Sabsik, Casdet, ABRisk, NPZW, RnkBend, Gencirc, susgen, confidence) | ||
md5 | 7077ab5685f753d94192aca8e3158fb5 | ||
sha256 | 751ad0b26586c0dbb06379c8bbb1b7a47e77adc19c3f068d6305f47faec551b2 | ||
ssdeep | 98304:Xrxkmr7CWoqbb4ngAFGw7WClREnjwaeSkMc88QS+qE0AaG8MlftjxeUZH:XKyzoLgkW4RmKMcJWqE0AaGxftjx/Z | ||
imphash | 217688f6edd2d15825eabb179401f94c | ||
impfuzzy | 24:avlIOUf6Uvvh9UteS1kLf0D3HuTMhlJ2pl39MsTcCoo3OovbOuH5jMsN5ZHuqu9X:s459UteS1kLpMEppBTcCoT3mf4 |
Network IP location
Signature (15cnts)
Level | Description |
---|---|
danger | File has been identified by 43 AntiVirus engines on VirusTotal as malicious |
danger | File has been identified by 43 AntiVirus engines on VirusTotal as malicious |
watch | Attempts to identify installed AV products by installation directory |
watch | Network communications indicative of possible code injection originated from the process explorer.exe |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Creates a suspicious process |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Sends data using the HTTP POST Method |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | Checks amount of memory in system |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | The file contains an unknown PE resource name possibly indicative of a packer |
Rules (13cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | PNG_Format_Zero | PNG Format | binaries (download) |
info | 1 | dumpmem | |
info | 1 | memory | |
info | 1 | office | |
info | 1 | scripts | |
info | 1 | urls | |
info | 94102 | shellcode |
PE API
IAT(Import Address Table) Library
KERNEL32.dll
&emsp
KERNEL32.dll
&emsp