ScreenShot
Created | 2024.09.17 14:02 | Machine | s1_win7_x6401 |
Filename | 1.exe | ||
Type | MS-DOS executable | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 59 detected (AIDetectMalware, NetWire, Malicious, score, Gaobot, Doris, Unsafe, Vfkh, confidence, Attribute, HighConfidence, high confidence, Weecnaw, None, jowrpa, CLOUD, MulDrop20, R002C0DIF24, Real Protect, high, EncPk, Static AI, Malicious PE, Detected, GrayWare, Kryptik, HeurC, KVMH008, ~GEN@1oh172, ABTrojan, SEEL, Artemis, NetWiredRC, HackTool, Patcher, SdBot, Probably Heur, ExeHeaderP, Dkjl, susgen) | ||
md5 | adc4317ced6ff9de7e8b5fc1f60b380a | ||
sha256 | 934f956a1d2dda18dd41936e1501ce338651986c370594eb67a1c74d759990eb | ||
ssdeep | 3072:6lWXBDp575Ptx4WR59bhpRi3nFsoomZjHbCRFcilcU8C3y2bfvXh:npzlxjXrR4s76T2RxlcUAGfvXh | ||
imphash | 87bed5a7cba00c7e1f4015f1bdae2183 | ||
impfuzzy | 3:swBJAEPwS9KTXzW:dBJAEHGDW |
Network IP location
Signature (6cnts)
Level | Description |
---|---|
danger | Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | File has been identified by 59 AntiVirus engines on VirusTotal as malicious |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | Checks if process is being debugged by a debugger |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | The executable uses a known packer |
Rules (2cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
PE API
IAT(Import Address Table) Library
kernel32.dll
0x45100c LoadLibraryA
0x451010 GetProcAddress
EAT(Export Address Table) is none
kernel32.dll
0x45100c LoadLibraryA
0x451010 GetProcAddress
EAT(Export Address Table) is none