Report - rev.exe

Metasploit Generic Malware PE64 PE File
ScreenShot
Created 2024.05.30 09:45 Machine s1_win7_x6401
Filename rev.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
8
Behavior Score
2.4
ZERO API file : malware
VT API (file)
md5 b3e1688a68a66cf3844242de091a1dde
sha256 083a504054bf5034a40c863a4d1dd489a89fa50cc944f8c71994ec3292e95248
ssdeep 24:eFGStrJ9u0/6hQnZdkBQAVn1Y+BXKLqdeNDMSCvOXpmB:is0wEkBQAq+BX9SD9C2kB
imphash b4c6fff030479aa3b12625be67bf4914
impfuzzy 3:siBJJ671MOB:tUZB
  Network IP location

Signature (4cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
danger Windows_Trojan_Metasploit_91bc5d7d (no description) binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
94.139.242.7 RU intersat Ltd. 94.139.242.7 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140003000 VirtualAlloc
 0x140003008 ExitProcess

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure