Report - Exodus.exe

HelloXD Ransomware PE64 PE File
ScreenShot
Created 2024.04.29 14:39 Machine s1_win7_x6401
Filename Exodus.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
11
Behavior Score
1.4
ZERO API file : malware
VT API (file) 52 detected (AIDetectMalware, Miner, Malicious, score, S32361963, GenericKD, Tedy, CoinMiner, Kryptik, Vfkh, Attribute, HighConfidence, high confidence, Zusy, puXfYWFTsfG, AGEN, Siggen28, SMOKELOADER, YXEDZZ, Krypt, Detected, GenKryptik, XMRig, Malware@#3kmsw4y8kq8u7, Eldorado, DropperX, R622355, OScope, GdSda, Kzfl, ai score=82, GQCB)
md5 3b43da1be0c39802b78f6b2c55c4d7e6
sha256 00f5cb420d8caf253b67e22714104ce1fb2d75341286c6e3ff31f527e7e5f5eb
ssdeep 49152:tq+bulp7HM3wpNbmZTfpuentlEt4TNBKpjQBHYKiLz01AkC:tq+EZHM3AsZfpuulEt4TNBY0BeU1Ak
imphash de41d4e0545d977de6ca665131bb479a
impfuzzy 12:FMHHGf5XGXKiEG6eGJyJk6lTpJq/iZJAgRJRJJoARZqRVPXJHqc:FMGf5XGf6ZgJkoDq6ZJ9fjBcV9
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 52 AntiVirus engines on VirusTotal as malicious
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
danger HelloXD_Ransomware HelloXD Ransomware binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
xmr-eu1.nanopool.org FR Online S.a.s. 51.15.193.130 mailcious
54.37.232.103 FR OVH SAS 54.37.232.103 clean

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x14000a760 __C_specific_handler
 0x14000a768 __getmainargs
 0x14000a770 __initenv
 0x14000a778 __iob_func
 0x14000a780 __set_app_type
 0x14000a788 __setusermatherr
 0x14000a790 _amsg_exit
 0x14000a798 _cexit
 0x14000a7a0 _commode
 0x14000a7a8 _fmode
 0x14000a7b0 _initterm
 0x14000a7b8 _onexit
 0x14000a7c0 _wcsicmp
 0x14000a7c8 _wcsnicmp
 0x14000a7d0 abort
 0x14000a7d8 calloc
 0x14000a7e0 exit
 0x14000a7e8 fprintf
 0x14000a7f0 free
 0x14000a7f8 fwrite
 0x14000a800 malloc
 0x14000a808 memcpy
 0x14000a810 memset
 0x14000a818 signal
 0x14000a820 strlen
 0x14000a828 strncmp
 0x14000a830 vfprintf
 0x14000a838 wcscat
 0x14000a840 wcscpy
 0x14000a848 wcslen
 0x14000a850 wcsncmp
KERNEL32.dll
 0x14000a860 DeleteCriticalSection
 0x14000a868 EnterCriticalSection
 0x14000a870 GetLastError
 0x14000a878 InitializeCriticalSection
 0x14000a880 LeaveCriticalSection
 0x14000a888 SetUnhandledExceptionFilter
 0x14000a890 Sleep
 0x14000a898 TlsGetValue
 0x14000a8a0 VirtualProtect
 0x14000a8a8 VirtualQuery

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure