Report - nc.exe

NMap Malicious Library UPX PE File PE32
ScreenShot
Created 2024.08.05 11:12 Machine s1_win7_x6403
Filename nc.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
7
Behavior Score
3.2
ZERO API file : malware
VT API (file) 55 detected (AIDetectMalware, Agobot, malicious, high confidence, Gaobot, GenericKD, Unsafe, Netcat, Uvx0, Attribute, HighConfidence, RemoteAdmin, AB potentially unsafe, RemAdm, NetTool, eaxow, YzY0Ojzyy1LXh3Ea, Tool, moderate, score, Generic Reputation PUA, Detected, Malware@#hxx6o6x3hn8s, Tiggre, IRCBot, BScope, Shelma, Gencirc, GenAsa, DxFTqIwIx+4, ai score=100, susgen, Hacktool)
md5 dc5648020ee3e38a8b716d0f9d2faac2
sha256 aeb1335197aa4892b058ff77c3de3df9f87eac358fd814f991498e829f323c64
ssdeep 1536:4wJQRNWLONcAek9DO73v8KAS37t8vayovKQy52oZUIB:4tPNxet73vWmKtiKQDoZU
imphash 41f720bd087649bc119f3acf4b5e4652
impfuzzy 24:YIQbplrb3NEMQOMC0DDRu/epZig8ojOovMyvbFI3/BMDfVVmNAKJOjsk030G83+5:YrNwYepOoCK8/BMDt+Jx303qh
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
info Command line console output was observed
info The executable uses a known packer

Rules (5cnts)

Level Name Description Collection
warning NMap NMAP binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
45.137.64.40 NL Zomro B.V. 45.137.64.40 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x412254 ExitProcess
 0x412258 DisconnectNamedPipe
 0x41225c TerminateProcess
 0x412260 WaitForMultipleObjects
 0x412264 TerminateThread
 0x412268 GetLastError
 0x41226c CreateThread
 0x412270 CreatePipe
 0x412274 CreateProcessA
 0x412278 DuplicateHandle
 0x41227c GetCurrentProcess
 0x412280 ExitThread
 0x412284 Sleep
 0x412288 ReadFile
 0x41228c PeekNamedPipe
 0x412290 WriteFile
 0x412294 GetStdHandle
 0x412298 FreeConsole
 0x41229c GetStartupInfoA
 0x4122a0 WideCharToMultiByte
 0x4122a4 WriteConsoleA
 0x4122a8 CreateFileA
 0x4122ac SetEndOfFile
 0x4122b0 PeekConsoleInputA
 0x4122b4 GetConsoleMode
 0x4122b8 GetNumberOfConsoleInputEvents
 0x4122bc ReadConsoleInputA
 0x4122c0 LCMapStringW
 0x4122c4 SetConsoleMode
 0x4122c8 LoadLibraryA
 0x4122cc GetProcAddress
 0x4122d0 LCMapStringA
 0x4122d4 GetStringTypeA
 0x4122d8 SetFilePointer
 0x4122dc GetStringTypeW
 0x4122e0 SetEnvironmentVariableA
 0x4122e4 GetOEMCP
 0x4122e8 SetStdHandle
 0x4122ec CompareStringW
 0x4122f0 CompareStringA
 0x4122f4 GetACP
 0x4122f8 MultiByteToWideChar
 0x4122fc GetEnvironmentStringsW
 0x412300 GetCPInfo
 0x412304 FreeEnvironmentStringsW
 0x412308 HeapFree
 0x41230c HeapAlloc
 0x412310 CloseHandle
 0x412314 Beep
 0x412318 GetTimeZoneInformation
 0x41231c GetSystemTime
 0x412320 GetLocalTime
 0x412324 GetCommandLineA
 0x412328 GetVersion
 0x41232c SetHandleCount
 0x412330 GetFileType
 0x412334 FreeEnvironmentStringsA
 0x412338 GetEnvironmentStrings
 0x41233c HeapDestroy
 0x412340 HeapCreate
 0x412344 VirtualFree
 0x412348 VirtualAlloc
 0x41234c HeapReAlloc
 0x412350 IsBadWritePtr
 0x412354 FlushFileBuffers
 0x412358 RtlUnwind
 0x41235c UnhandledExceptionFilter
 0x412360 GetModuleFileNameA
WSOCK32.dll
 0x4123c4 select
 0x4123c8 __WSAFDIsSet
 0x4123cc recvfrom
 0x4123d0 listen
 0x4123d4 getsockname
 0x4123d8 socket
 0x4123dc accept
 0x4123e0 WSASetLastError
 0x4123e4 connect
 0x4123e8 setsockopt
 0x4123ec ind
 0x4123f0 ntohs
 0x4123f4 htons
 0x4123f8 getservbyport
 0x4123fc gethostbyname
 0x412400 getservbyname
 0x412404 ioctlsocket
 0x412408 WSAGetLastError
 0x41240c inet_addr
 0x412410 gethostbyaddr
 0x412414 recv
 0x412418 WSAStartup
 0x41241c WSACleanup
 0x412420 closesocket
 0x412424 send
 0x412428 shutdown

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure