Report - qidong.exe

Malicious Library PE File PE32
ScreenShot
Created 2025.01.03 17:58 Machine s1_win7_x6401
Filename qidong.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score Not founds Behavior Score
0.6
ZERO API file : clean
VT API (file) 8 detected (malicious, confidence, BypassUAC, LESS, bWQ1OgaF+Szp4L23, score, susgen)
md5 fd3b02595e57959bdffe927dfa01b651
sha256 d11790375573ac728cbd860735a7cfa37e9ed624c9f758b1153c1ec36054682c
ssdeep 384:N5tmVYRTF5Uy06VkFowCTgwuBv9Fr/L8EwpESycPNAX/LuazV0ocRUos7Xh3awZT:9mVYRT370TV9BNw/jNAvLU9UosbJawq
imphash ae1179fd332ecab323e4058edd63692f
impfuzzy 24:tnOovufiv8ERRv07JHXuklEEfcfDot9qL:QhfW0qEfcsIL
  Network IP location

Signature (2cnts)

Level Description
notice File has been identified by 8 AntiVirus engines on VirusTotal as malicious
info The executable uses a known packer

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x406000 GetTickCount
 0x406004 GetTempPathW
 0x406008 GetCommandLineA
 0x40600c GetVersion
 0x406010 ExitProcess
 0x406014 TerminateProcess
 0x406018 GetCurrentProcess
 0x40601c HeapReAlloc
 0x406020 HeapAlloc
 0x406024 HeapSize
 0x406028 UnhandledExceptionFilter
 0x40602c GetModuleFileNameA
 0x406030 FreeEnvironmentStringsA
 0x406034 FreeEnvironmentStringsW
 0x406038 WideCharToMultiByte
 0x40603c GetEnvironmentStrings
 0x406040 GetEnvironmentStringsW
 0x406044 SetHandleCount
 0x406048 GetStdHandle
 0x40604c GetFileType
 0x406050 GetStartupInfoA
 0x406054 GetCurrentThreadId
 0x406058 TlsSetValue
 0x40605c TlsAlloc
 0x406060 SetLastError
 0x406064 TlsGetValue
 0x406068 GetLastError
 0x40606c GetModuleHandleA
 0x406070 GetEnvironmentVariableA
 0x406074 GetVersionExA
 0x406078 HeapDestroy
 0x40607c HeapCreate
 0x406080 VirtualFree
 0x406084 HeapFree
 0x406088 RtlUnwind
 0x40608c WriteFile
 0x406090 InitializeCriticalSection
 0x406094 EnterCriticalSection
 0x406098 LeaveCriticalSection
 0x40609c VirtualAlloc
 0x4060a0 GetCPInfo
 0x4060a4 GetACP
 0x4060a8 GetOEMCP
 0x4060ac GetProcAddress
 0x4060b0 LoadLibraryA
 0x4060b4 MultiByteToWideChar
 0x4060b8 LCMapStringA
 0x4060bc LCMapStringW
 0x4060c0 GetStringTypeA
 0x4060c4 GetStringTypeW
 0x4060c8 InterlockedDecrement
 0x4060cc InterlockedIncrement
USER32.dll
 0x4060d4 wsprintfW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure