Report - gsprout.exe

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.08.17 22:16 Machine s1_win7_x6401
Filename gsprout.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
3.0
ZERO API file : malware
VT API (file) 51 detected (AIDetectMalware, malicious, high confidence, score, Fragtor, Unsafe, Save, Genus, Attribute, HighConfidence, Kryptik, AGen, CrypterX, Zudochka, khgikm, XxsjwueTduU, Siggen3, moderate, Static AI, Suspicious PE, Detected, ai score=89, XOREncoded, Predator, Taurus, R638921, TrojanPSW, GlorySprout, Gencirc, b1bRMJJ28VU, PassStealer, susgen, confidence)
md5 92ae7a1286d992e104c0072f639941f7
sha256 1771c4e6e34fda6a68c7b1d980cc3dffbe587c651f985bf7235c6af9a8904fd3
ssdeep 6144:S7iHIcfYlXolTFsr91vzWmUuNTuBjEKz7nwWYcEZoSNDyaN9b/7:FPYJolZsr9kjuNTuVFfnwHYSNGOb/7
imphash 17ce412007ec6b063cb9a92ee7b9b417
impfuzzy 24:GyftmS1+MdlJeDc+pl3eDoroAXSOovbOPZvvPGMM:1tmS1+Mic+ppXn35a
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 51 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://45.138.16.71/cfg/?data=IDaJhCHdIlfHcldJAISHfgpYzZhgReLDAihcV0Oa NL SpectraIP B.V. 45.138.16.71 clean
45.138.16.71 NL SpectraIP B.V. 45.138.16.71 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x439000 SizeofResource
 0x439004 FindResourceA
 0x439008 GetModuleHandleA
 0x43900c LockResource
 0x439010 LoadResource
 0x439014 WriteConsoleW
 0x439018 IsProcessorFeaturePresent
 0x43901c IsDebuggerPresent
 0x439020 UnhandledExceptionFilter
 0x439024 SetUnhandledExceptionFilter
 0x439028 GetStartupInfoW
 0x43902c GetModuleHandleW
 0x439030 QueryPerformanceCounter
 0x439034 GetCurrentProcessId
 0x439038 GetCurrentThreadId
 0x43903c GetSystemTimeAsFileTime
 0x439040 InitializeSListHead
 0x439044 GetCurrentProcess
 0x439048 TerminateProcess
 0x43904c RtlUnwind
 0x439050 RaiseException
 0x439054 GetLastError
 0x439058 SetLastError
 0x43905c EncodePointer
 0x439060 EnterCriticalSection
 0x439064 LeaveCriticalSection
 0x439068 DeleteCriticalSection
 0x43906c InitializeCriticalSectionAndSpinCount
 0x439070 TlsAlloc
 0x439074 TlsGetValue
 0x439078 TlsSetValue
 0x43907c TlsFree
 0x439080 FreeLibrary
 0x439084 GetProcAddress
 0x439088 LoadLibraryExW
 0x43908c ExitProcess
 0x439090 GetModuleHandleExW
 0x439094 GetModuleFileNameW
 0x439098 GetStdHandle
 0x43909c WriteFile
 0x4390a0 WideCharToMultiByte
 0x4390a4 MultiByteToWideChar
 0x4390a8 HeapFree
 0x4390ac HeapAlloc
 0x4390b0 FindClose
 0x4390b4 FindFirstFileExW
 0x4390b8 FindNextFileW
 0x4390bc IsValidCodePage
 0x4390c0 GetACP
 0x4390c4 GetOEMCP
 0x4390c8 GetCPInfo
 0x4390cc GetCommandLineA
 0x4390d0 GetCommandLineW
 0x4390d4 GetEnvironmentStringsW
 0x4390d8 FreeEnvironmentStringsW
 0x4390dc LCMapStringW
 0x4390e0 GetProcessHeap
 0x4390e4 GetFileType
 0x4390e8 SetStdHandle
 0x4390ec GetStringTypeW
 0x4390f0 HeapSize
 0x4390f4 HeapReAlloc
 0x4390f8 FlushFileBuffers
 0x4390fc GetConsoleOutputCP
 0x439100 GetConsoleMode
 0x439104 SetFilePointerEx
 0x439108 CreateFileW
 0x43910c CloseHandle
 0x439110 DecodePointer

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure