ScreenShot
Created | 2024.08.17 22:17 | Machine | s1_win7_x6403 |
Filename | sss.exe | ||
Type | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 60 detected (AIDetectMalware, AsyncRAT, Windows, Threat, Jalapeno, YakbeexMSIL, Unsafe, Save, malicious, GenusT, DTXQ, Attribute, HighConfidence, KeyloggerX, kbmvdo, CLASSIC, AGEN, Real Protect, Static AI, Malicious PE, amfgq, Detected, ai score=83, Crysan, atmn, DCRat, Eldorado, ZemsilF, km0@a4dXiEh, Outbreak, Gencirc, IaVjqYXjrFY, PwStealer, confidence, 100%, Stub) | ||
md5 | f93a30378f7682e1bf9f4adfbe5729be | ||
sha256 | 22490241e703aecb478572122c4dd5b1adf2fba6ea17b5922daf207fc7e0cc29 | ||
ssdeep | 3072:Ne8p6ewdOIwQx76vK/bvTv0cU+lL/dMlZZUZ0b2gTJwARE+WpCc:R6ewwIwQJ6vKX0c5MlYZ0b2C | ||
imphash | f34d5f2d4577ed6d9ceec516c1f5a744 | ||
impfuzzy | 3:rGsLdAIEK:tf |
Network IP location
Signature (6cnts)
Level | Description |
---|---|
danger | File has been identified by 60 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Looks up the external IP address |
notice | Performs some HTTP requests |
notice | Uses Windows utilities for basic Windows functionality |
Rules (11cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (upload) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
watch | Win32_Trojan_PWS_Net_1_Zero | Win32 Trojan PWS .NET Azorult | binaries (upload) |
notice | anti_vm_detect | Possibly employs anti-virtualization techniques | binaries (download) |
info | Is_DotNET_EXE | (no description) | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | JPEG_Format_Zero | JPEG Format | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (9cnts) ?
Suricata ids
ET HUNTING Telegram API Domain in DNS Lookup
ET INFO TLS Handshake Failure
ET POLICY IP Check Domain (icanhazip. com in HTTP Host)
ET INFO External IP Lookup Domain in DNS Lookup (icanhazip .com)
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET POLICY Observed Wifi Geolocation Domain (api .mylnikov .org in TLS SNI)
ET INFO TLS Handshake Failure
ET POLICY IP Check Domain (icanhazip. com in HTTP Host)
ET INFO External IP Lookup Domain in DNS Lookup (icanhazip .com)
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET POLICY Observed Wifi Geolocation Domain (api .mylnikov .org in TLS SNI)
PE API
IAT(Import Address Table) Library
mscoree.dll
0x402000 _CorExeMain
EAT(Export Address Table) is none
mscoree.dll
0x402000 _CorExeMain
EAT(Export Address Table) is none