Report - xxx.exe

PE File PE64
ScreenShot
Created 2024.10.17 10:48 Machine s1_win7_x6401
Filename xxx.exe
Type PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
AI Score
5
Behavior Score
4.8
ZERO API
VT API (file) 33 detected (AIDetectMalware, Malicious, score, Artemis, Vuls, confidence, GenericKD, high confidence, a variant of Generik, THYAWK, MalwareX, Static AI, Malicious PE, Detected, Wacapew, Rozena, Eldorado, Outbreak, Meterpreter, susgen, PossibleThreat)
md5 28b7505a051cf6a0e6ee179ef76be154
sha256 1895cb39da800c897240669ce9a3e39cdf129b89c05f642c98ed324dad32fdb5
ssdeep 96:HnGS2T9v7+4fzeTJUA57EF4gVp9VkKvKPSvIazNt:ARyqCem7eVp9VkKvMSvIc
imphash
impfuzzy 3::
  Network IP location

Signature (11cnts)

Level Description
danger File has been identified by 33 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info This executable has a PDB path

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://156.245.12.57:8000/1222.txt HK SonderCloud Limited 156.245.12.57
156.245.12.57 HK SonderCloud Limited 156.245.12.57
136.243.104.235 DE Hetzner Online GmbH 136.243.104.235

Suricata ids

PE API

IAT(Import Address Table) is none

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure