Report - rkduajedzcrd.exe

Generic Malware PE File PE64
ScreenShot
Created 2024.10.20 11:19 Machine s1_win7_x6401
Filename rkduajedzcrd.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
7
Behavior Score
1.4
ZERO API file : clean
VT API (file) 59 detected (AIDetectMalware, Reflo, Windows, Threat, Malicious, score, CoinMiner, S32378657, Unsafe, Mint, Zard, Save, Kryptik, FWHP, Genkryptik, kqizrx, qANomcoTHvR, AGEN, Siggen29, R002C0DGU24, Krypt, Detected, ai score=85, Eldorado, DropperX, R622355, OScope, Miner, GdSda, GQCB, confidence)
md5 0838e4e90814a48e6122f4b0a2b2fc5f
sha256 4f63cd101e4bdaacffd9169610b7bb9430de6bf87b9016125a3d76368f3e1fa7
ssdeep 98304:zxrSpzFH7gGBN9CsoC18nY97TGAQ0U06pDcROsKoE5jVMo9xRCJiWug/T:zUpZwsqyVQBQKoENtxREM
imphash 203d63d5d9a088e2d84cef737227986b
impfuzzy 12:FMHHGf5XGXKiEG6eGJyJk6lTpJq/iZJfMRJRJJoARZqRVPXJHqc:FMGf5XGf6ZgJkoDq6ZJfQfjBcV9
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 59 AntiVirus engines on VirusTotal as malicious
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
xmr-asia1.nanopool.org SG Linode, LLC 172.104.165.191 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x14000ac48 __C_specific_handler
 0x14000ac50 __getmainargs
 0x14000ac58 __initenv
 0x14000ac60 __iob_func
 0x14000ac68 __set_app_type
 0x14000ac70 __setusermatherr
 0x14000ac78 _amsg_exit
 0x14000ac80 _cexit
 0x14000ac88 _commode
 0x14000ac90 _fmode
 0x14000ac98 _initterm
 0x14000aca0 _onexit
 0x14000aca8 _wcsicmp
 0x14000acb0 _wcsnicmp
 0x14000acb8 abort
 0x14000acc0 calloc
 0x14000acc8 exit
 0x14000acd0 fprintf
 0x14000acd8 free
 0x14000ace0 fwrite
 0x14000ace8 malloc
 0x14000acf0 memcpy
 0x14000acf8 memset
 0x14000ad00 signal
 0x14000ad08 strlen
 0x14000ad10 strncmp
 0x14000ad18 vfprintf
 0x14000ad20 wcscat
 0x14000ad28 wcscpy
 0x14000ad30 wcslen
 0x14000ad38 wcsncmp
 0x14000ad40 wcsstr
KERNEL32.dll
 0x14000ad50 DeleteCriticalSection
 0x14000ad58 EnterCriticalSection
 0x14000ad60 GetLastError
 0x14000ad68 InitializeCriticalSection
 0x14000ad70 LeaveCriticalSection
 0x14000ad78 SetUnhandledExceptionFilter
 0x14000ad80 Sleep
 0x14000ad88 TlsGetValue
 0x14000ad90 VirtualProtect
 0x14000ad98 VirtualQuery

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure