Report - asdz2.png

PE File PE64
ScreenShot
Created 2024.10.09 13:01 Machine s1_win7_x6401
Filename asdz2.png
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
8
Behavior Score
1.4
ZERO API file : malware
VT API (file) 58 detected (AIDetectMalware, Malicious, score, CoinMiner, S32378657, FWEM, Unsafe, Mint, Zard, Save, Windows, Threat, Kryptik, Zusy, kpuodh, puXfYWFTsfG, AGEN, Siggen29, R002C0DFT24, Krypt, Static AI, Malicious PE, Detected, GenKryptik, Eldorado, DropperX, R622355, OScope, Miner, GdSda, susgen, GQCB, Tedy)
md5 61d3abff46a6bd2946925542c7d30397
sha256 b1a351ee61443b8558934dca6b2fa9efb0a6d2d18bae61ace5a761596604dbfa
ssdeep 49152:e+CCncEUAhZfuFtUasR7NICKP6Fhjf+POnLcjzlfXhITNE1u5xY13oNV:c8cMhZfuF6asRxm6Flf++olfX2u1OY13
imphash de41d4e0545d977de6ca665131bb479a
impfuzzy 12:FMHHGf5XGXKiEG6eGJyJk6lTpJq/iZJAgRJRJJoARZqRVPXJHqc:FMGf5XGf6ZgJkoDq6ZJ9fjBcV9
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 58 AntiVirus engines on VirusTotal as malicious
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
xmr-eu1.nanopool.org DE OVH SAS 51.89.23.91 mailcious
xmr-eu2.nanopool.org FR OVH SAS 51.68.137.186 mailcious
pastebin.com US CLOUDFLARENET 172.67.19.24 mailcious
104.20.4.235 US CLOUDFLARENET 104.20.4.235 mailcious
51.15.65.182 NL Online S.a.s. 51.15.65.182 mailcious
51.15.61.114 NL Online S.a.s. 51.15.61.114 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x14000cd10 __C_specific_handler
 0x14000cd18 __getmainargs
 0x14000cd20 __initenv
 0x14000cd28 __iob_func
 0x14000cd30 __set_app_type
 0x14000cd38 __setusermatherr
 0x14000cd40 _amsg_exit
 0x14000cd48 _cexit
 0x14000cd50 _commode
 0x14000cd58 _fmode
 0x14000cd60 _initterm
 0x14000cd68 _onexit
 0x14000cd70 _wcsicmp
 0x14000cd78 _wcsnicmp
 0x14000cd80 abort
 0x14000cd88 calloc
 0x14000cd90 exit
 0x14000cd98 fprintf
 0x14000cda0 free
 0x14000cda8 fwrite
 0x14000cdb0 malloc
 0x14000cdb8 memcpy
 0x14000cdc0 memset
 0x14000cdc8 signal
 0x14000cdd0 strlen
 0x14000cdd8 strncmp
 0x14000cde0 vfprintf
 0x14000cde8 wcscat
 0x14000cdf0 wcscpy
 0x14000cdf8 wcslen
 0x14000ce00 wcsncmp
KERNEL32.dll
 0x14000ce10 DeleteCriticalSection
 0x14000ce18 EnterCriticalSection
 0x14000ce20 GetLastError
 0x14000ce28 InitializeCriticalSection
 0x14000ce30 LeaveCriticalSection
 0x14000ce38 SetUnhandledExceptionFilter
 0x14000ce40 Sleep
 0x14000ce48 TlsGetValue
 0x14000ce50 VirtualProtect
 0x14000ce58 VirtualQuery

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure