ScreenShot
Created | 2024.08.06 09:14 | Machine | s1_win7_x6403 |
Filename | nc.exe | ||
Type | PE32 executable (console) Intel 80386, for MS Windows, PECompact2 compressed | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 55 detected (NetCat, malicious, high confidence, score, CMCRadar, GenPack, NetTool, Unsafe, Tool, Vkba, RemoteAdmin, AB potentially unsafe, eplb, CLOUD, PrivacyRisk, HACKINGTOOLS, high, Static AI, Suspicious PE, Detected, ai score=76, ApplicUnsaf, RemoteAdmin@4i2o, Casdet, Threat, HLLIP, based, Maximus, PolyCrypt, Gencirc, HackTool, susgen, confidence, NylLqj) | ||
md5 | 04915e73e6b6d161b573c86b8c3c030d | ||
sha256 | 3563add573f0ccd8fed5837e38eb6e889a99d2acf9a1eb0a9747ca46d2f5b6fa | ||
ssdeep | 768:mMBOqWS5cvgHEda3LqFwQjaWzCX4wHQWvOLTsLuOVojlR:xwSegHfLqWQBzi3HGdwa | ||
imphash | 09d0478591d4f788cb3e5ea416c25237 | ||
impfuzzy | 3:swBJAEPwS9KTXzhAXwEBJJ67EGVn:dBJAEHGDymVn |
Network IP location
Signature (6cnts)
Level | Description |
---|---|
danger | File has been identified by 55 AntiVirus engines on VirusTotal as malicious |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | Command line console output was observed |
info | One or more processes crashed |
info | The executable uses a known packer |
Rules (2cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
kernel32.dll
0x413000 LoadLibraryA
0x413004 GetProcAddress
0x413008 VirtualAlloc
0x41300c VirtualFree
EAT(Export Address Table) is none
kernel32.dll
0x413000 LoadLibraryA
0x413004 GetProcAddress
0x413008 VirtualAlloc
0x41300c VirtualFree
EAT(Export Address Table) is none