Report - Responder.exe

Gen1 Generic Malware Malicious Library UPX PE File PE32 DLL OS Processor Check .NET DLL
ScreenShot
Created 2024.11.11 09:44 Machine s1_win7_x6401
Filename Responder.exe
Type PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
6
Behavior Score
2.6
ZERO API
VT API (file) 44 detected (Hacktool, Responder, Malicious, score, GenericPMF, S3018656, HTool, Marte, Unsafe, confidence, 100%, Python, PrivacyRisk, Tool, atph, Detected, APT40, Presenoker, Eldorado, Neshta, FileInfector, Bnhl)
md5 c808d2ed8bb6b2e3c06c907a01b73d06
sha256 47d121087c05568fe90a25ef921f9e35d40bc6bec969e33e75337fc9b580f0e8
ssdeep 98304:WZAsErGdEvDnybZ9m4LnHxY0pl+WKl/J4M/on7vm:BPQonug4LHLG2won7+
imphash be10bb45cef8dcc6869b921dd20884ae
impfuzzy 48:IfrZ93D1wcnNebJGpJu8I/saeBFO5yqfZD:IfrZR1wcnNebJGpA82UAMqRD
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 44 AntiVirus engines on VirusTotal as malicious
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice The binary likely contains encrypted or compressed data indicative of a packer
info Command line console output was observed

Rules (12cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
info Is_DotNET_DLL (no description) binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41e218 CreateProcessW
 0x41e21c DeleteCriticalSection
 0x41e220 EnterCriticalSection
 0x41e224 ExpandEnvironmentStringsW
 0x41e228 FormatMessageA
 0x41e22c GetCommandLineW
 0x41e230 GetCurrentProcess
 0x41e234 GetCurrentProcessId
 0x41e238 GetCurrentThreadId
 0x41e23c GetEnvironmentVariableW
 0x41e240 GetExitCodeProcess
 0x41e244 GetLastError
 0x41e248 GetModuleFileNameW
 0x41e24c GetModuleHandleA
 0x41e250 GetProcAddress
 0x41e254 GetShortPathNameW
 0x41e258 GetStartupInfoW
 0x41e25c GetSystemTimeAsFileTime
 0x41e260 GetTempPathW
 0x41e264 GetTickCount
 0x41e268 InitializeCriticalSection
 0x41e26c LeaveCriticalSection
 0x41e270 LoadLibraryA
 0x41e274 LoadLibraryExW
 0x41e278 MultiByteToWideChar
 0x41e27c QueryPerformanceCounter
 0x41e280 SetDllDirectoryW
 0x41e284 SetEnvironmentVariableW
 0x41e288 SetUnhandledExceptionFilter
 0x41e28c Sleep
 0x41e290 TerminateProcess
 0x41e294 TlsGetValue
 0x41e298 UnhandledExceptionFilter
 0x41e29c VirtualProtect
 0x41e2a0 VirtualQuery
 0x41e2a4 WaitForSingleObject
 0x41e2a8 WideCharToMultiByte
msvcrt.dll
 0x41e2b0 __argc
 0x41e2b4 __dllonexit
 0x41e2b8 __lconv_init
 0x41e2bc __set_app_type
 0x41e2c0 __setusermatherr
 0x41e2c4 __wargv
 0x41e2c8 __wgetmainargs
 0x41e2cc __winitenv
 0x41e2d0 _amsg_exit
 0x41e2d4 _cexit
 0x41e2d8 _findclose
 0x41e2dc _fileno
 0x41e2e0 _fmode
 0x41e2e4 _fullpath
 0x41e2e8 _get_osfhandle
 0x41e2ec _initterm
 0x41e2f0 _iob
 0x41e2f4 _lock
 0x41e2f8 _getpid
 0x41e2fc _onexit
 0x41e300 _setmode
 0x41e304 _stat
 0x41e308 _strdup
 0x41e30c _unlock
 0x41e310 _vsnprintf
 0x41e314 _vsnwprintf
 0x41e318 _wcmdln
 0x41e31c _wfindfirst
 0x41e320 _wfindnext
 0x41e324 _wfopen
 0x41e328 _wmkdir
 0x41e32c _wremove
 0x41e330 _wrmdir
 0x41e334 _wstat
 0x41e338 _wtempnam
 0x41e33c abort
 0x41e340 calloc
 0x41e344 clearerr
 0x41e348 exit
 0x41e34c fclose
 0x41e350 feof
 0x41e354 ferror
 0x41e358 fflush
 0x41e35c fprintf
 0x41e360 fread
 0x41e364 free
 0x41e368 fseek
 0x41e36c ftell
 0x41e370 fwrite
 0x41e374 getenv
 0x41e378 malloc
 0x41e37c mbstowcs
 0x41e380 memcpy
 0x41e384 memset
 0x41e388 setbuf
 0x41e38c setlocale
 0x41e390 signal
 0x41e394 sprintf
 0x41e398 strcat
 0x41e39c strchr
 0x41e3a0 strcmp
 0x41e3a4 strcpy
 0x41e3a8 strlen
 0x41e3ac strncat
 0x41e3b0 strncmp
 0x41e3b4 strncpy
 0x41e3b8 strrchr
 0x41e3bc strtok
 0x41e3c0 vfprintf
 0x41e3c4 wcscat
 0x41e3c8 wcscmp
 0x41e3cc wcscpy
 0x41e3d0 wcslen
WS2_32.dll
 0x41e3d8 ntohl

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure