ScreenShot
Created | 2024.06.11 10:50 | Machine | s1_win7_x6401 |
Filename | payload.dll | ||
Type | PE32 executable (DLL) (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 61 detected (AIDetectMalware, Marte, Malicious, score, GenericRI, S28877354, FTFU, Unsafe, HackTool, Reverse, through, uwccg, Windows, Metasploit, Meterpreter, Swrort, Inject4, jozwdf, Payload, SMDSA, high, FatRat, hherp, Detected, Hijacker, ai score=83, Invader, 10KKVZ1, Eldorado, R439046, ZedlaF, aq4@aS5O3Di, BScope, Genetic, Static AI, Malicious PE, susgen, Rozena) | ||
md5 | 43296c4ac197f6feae234bb99e90ad57 | ||
sha256 | 5efab529c30f2571bbb2c3d093898cdf296878dd330afc7dfd68bf86c53b7dae | ||
ssdeep | 48:qUr3zU9G4aNVhnX5hthMt6dO54WTJ7d5b:+DIi59J7 | ||
imphash | 57d6e7112c8e716cfe2eb0ff9f36763c | ||
impfuzzy | 6:XAx27j77OkMLilQJBloFqXNWlbxXNWlbRD/rQn:o27j7SktQqsXN8XNEk |
Network IP location
Signature (1cnts)
Level | Description |
---|---|
danger | File has been identified by 61 AntiVirus engines on VirusTotal as malicious |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | Swrort | Trojan:Win32/Meterpreter | binaries (upload) |
info | IsDLL | (no description) | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x10002000 CloseHandle
0x10002004 ReleaseSemaphore
0x10002008 WaitForSingleObject
0x1000200c CreateEventA
0x10002010 OpenEventA
0x10002014 ExitThread
0x10002018 ResumeThread
0x1000201c CreateProcessA
0x10002020 GetThreadContext
0x10002024 SetThreadContext
0x10002028 VirtualAllocEx
0x1000202c WriteProcessMemory
0x10002030 CreateSemaphoreA
EAT(Export Address Table) is none
KERNEL32.dll
0x10002000 CloseHandle
0x10002004 ReleaseSemaphore
0x10002008 WaitForSingleObject
0x1000200c CreateEventA
0x10002010 OpenEventA
0x10002014 ExitThread
0x10002018 ResumeThread
0x1000201c CreateProcessA
0x10002020 GetThreadContext
0x10002024 SetThreadContext
0x10002028 VirtualAllocEx
0x1000202c WriteProcessMemory
0x10002030 CreateSemaphoreA
EAT(Export Address Table) is none