Report - 10.exe

PE File PE32
ScreenShot
Created 2024.09.17 13:44 Machine s1_win7_x6401
Filename 10.exe
Type MS-DOS executable
AI Score
10
Behavior Score
3.8
ZERO API file : malware
VT API (file) 59 detected (AIDetectMalware, NetWire, Malicious, score, Gaobot, Doris, Unsafe, Vy9x, confidence, Attribute, HighConfidence, high confidence, Weecnaw, None, jssnyn, CLOUD, Wirenet, Real Protect, high, EncPk, SdBot, Detected, GrayWare, Kryptik, HeurC, KVMH008, se28865, ~GEN@1oh172, ABApplication, NUEN, HackTool, Patcher, Probably Heur, ExeHeaderP, Ddhl, susgen)
md5 4101b75d5e5fa4b011b571d090ed0501
sha256 0edbf3d32b22b572f8763c00d13ab0c62f7cc654a729fb8a73de31b031a5169b
ssdeep 3072:Up8pVnKOlShRr2hot1nliBNvZr4rEn7ZY2kvdG4gz:USpVKRahoX4NvZJnVYU4+
imphash 87bed5a7cba00c7e1f4015f1bdae2183
impfuzzy 3:swBJAEPwS9KTXzW:dBJAEHGDW
  Network IP location

Signature (6cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 59 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
LOCALSERVER.ns01.US US AS-COLOCROSSING 192.227.134.159 clean
localupdate.ns02.info US AS-COLOCROSSING 192.227.134.159 clean
192.227.134.159 US AS-COLOCROSSING 192.227.134.159 clean

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x45000c LoadLibraryA
 0x450010 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure