Report - blob.exe

PE64 PE File
ScreenShot
Created 2024.06.19 09:56 Machine s1_win7_x6401
Filename blob.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
11
Behavior Score
1.4
ZERO API file : malware
VT API (file) 59 detected (AIDetectMalware, Miner, Windows, Threat, Malicious, score, CoinMiner, S32378657, Tedy, Unsafe, Save, Kryptik, Artemis, koqvgm, puXfYWFTsfG, AGEN, Inject5, AMADEY, YXEFQZ, Krypt, Outbreak, Detected, ai score=88, GenKryptik, XMRig, Reflo, Eldorado, DropperX, R622355, OScope, GdSda, Gencirc, Static AI, Malicious PE, susgen, GQCB, confidence)
md5 fbfbe4ee13baecac3e7d16bec24cf079
sha256 3d65e5f78fa228a79d279fd903b45e584effe6b680d3a3adcb582985de62d01e
ssdeep 49152:0GXNqt3/rQCbVuI1SjuNVASD++6ozKQ/hD5xkmIW3vFqbrBeL9SSKl:0Gm3/rQCbVuIioc9ihD5KmjteALgl
imphash de41d4e0545d977de6ca665131bb479a
impfuzzy 12:FMHHGf5XGXKiEG6eGJyJk6lTpJq/iZJAgRJRJJoARZqRVPXJHqc:FMGf5XGf6ZgJkoDq6ZJ9fjBcV9
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 59 AntiVirus engines on VirusTotal as malicious
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
pool.hashvault.pro AU FireNet Pty Ltd 125.253.92.50 mailcious
125.253.92.50 AU FireNet Pty Ltd 125.253.92.50 clean

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x140009308 __C_specific_handler
 0x140009310 __getmainargs
 0x140009318 __initenv
 0x140009320 __iob_func
 0x140009328 __set_app_type
 0x140009330 __setusermatherr
 0x140009338 _amsg_exit
 0x140009340 _cexit
 0x140009348 _commode
 0x140009350 _fmode
 0x140009358 _initterm
 0x140009360 _onexit
 0x140009368 _wcsicmp
 0x140009370 _wcsnicmp
 0x140009378 abort
 0x140009380 calloc
 0x140009388 exit
 0x140009390 fprintf
 0x140009398 free
 0x1400093a0 fwrite
 0x1400093a8 malloc
 0x1400093b0 memcpy
 0x1400093b8 memset
 0x1400093c0 signal
 0x1400093c8 strlen
 0x1400093d0 strncmp
 0x1400093d8 vfprintf
 0x1400093e0 wcscat
 0x1400093e8 wcscpy
 0x1400093f0 wcslen
 0x1400093f8 wcsncmp
KERNEL32.dll
 0x140009408 DeleteCriticalSection
 0x140009410 EnterCriticalSection
 0x140009418 GetLastError
 0x140009420 InitializeCriticalSection
 0x140009428 LeaveCriticalSection
 0x140009430 SetUnhandledExceptionFilter
 0x140009438 Sleep
 0x140009440 TlsGetValue
 0x140009448 VirtualProtect
 0x140009450 VirtualQuery

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure