Report - payload.dll

Swrort DLL PE32 PE File
ScreenShot
Created 2024.06.11 10:50 Machine s1_win7_x6401
Filename payload.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
1.2
ZERO API file : malware
VT API (file) 61 detected (AIDetectMalware, Marte, Malicious, score, GenericRI, S28877354, FTFU, Unsafe, HackTool, Reverse, through, uwccg, Windows, Metasploit, Meterpreter, Swrort, Inject4, jozwdf, Payload, SMDSA, high, FatRat, hherp, Detected, Hijacker, ai score=83, Invader, 10KKVZ1, Eldorado, R439046, ZedlaF, aq4@aS5O3Di, BScope, Genetic, Static AI, Malicious PE, susgen, Rozena)
md5 43296c4ac197f6feae234bb99e90ad57
sha256 5efab529c30f2571bbb2c3d093898cdf296878dd330afc7dfd68bf86c53b7dae
ssdeep 48:qUr3zU9G4aNVhnX5hthMt6dO54WTJ7d5b:+DIi59J7
imphash 57d6e7112c8e716cfe2eb0ff9f36763c
impfuzzy 6:XAx27j77OkMLilQJBloFqXNWlbxXNWlbRD/rQn:o27j7SktQqsXN8XNEk
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 61 AntiVirus engines on VirusTotal as malicious

Rules (4cnts)

Level Name Description Collection
danger Swrort Trojan:Win32/Meterpreter binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x10002000 CloseHandle
 0x10002004 ReleaseSemaphore
 0x10002008 WaitForSingleObject
 0x1000200c CreateEventA
 0x10002010 OpenEventA
 0x10002014 ExitThread
 0x10002018 ResumeThread
 0x1000201c CreateProcessA
 0x10002020 GetThreadContext
 0x10002024 SetThreadContext
 0x10002028 VirtualAllocEx
 0x1000202c WriteProcessMemory
 0x10002030 CreateSemaphoreA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure