Report - UpdaterLOC.dll

Swrort Malicious Library PE File DLL PE32
ScreenShot
Created 2024.09.05 15:43 Machine s1_win7_x6401
Filename UpdaterLOC.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
1.2
ZERO API file : clean
VT API (file) 55 detected (AIDetectMalware, Windows, Metasploit, Malicious, score, GenericRXSC, Marte, Unsafe, Save, Attribute, HighConfidence, MsfShell, Inject4, jozwdf, Payload, high, FatRat, Static AI, Malicious PE, Invader, Detected, Hijacker, ai score=81, Meterpreter, 19A8VV2, Eldorado, R560701, ZedlaF, au4@aW56DOoi, BScope, Genetic, Szfl, +ww66SLDBtw, susgen, confidence, 100%)
md5 16834e676f3c8e4de9435cefe2846b50
sha256 080be64f9d322aad325f29c6f90f03f5ea394a24affcdd9b6c2fc834d96e5a6f
ssdeep 48:q0kV3zU9G4aNVh7XphlhEF57/ncjJZeCOOtJnw2OxPwybOE:vDIKk9Wow20P
imphash 57d6e7112c8e716cfe2eb0ff9f36763c
impfuzzy 6:XAx27j77OkMLilQJBloFqXNWlbxXNWlbRD/rQn:o27j7SktQqsXN8XNEk
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious

Rules (5cnts)

Level Name Description Collection
danger Swrort Trojan:Win32/Meterpreter binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x10002000 CloseHandle
 0x10002004 ReleaseSemaphore
 0x10002008 WaitForSingleObject
 0x1000200c CreateEventA
 0x10002010 OpenEventA
 0x10002014 ExitThread
 0x10002018 ResumeThread
 0x1000201c CreateProcessA
 0x10002020 GetThreadContext
 0x10002024 SetThreadContext
 0x10002028 VirtualAllocEx
 0x1000202c WriteProcessMemory
 0x10002030 CreateSemaphoreA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure