ScreenShot
Created | 2025.01.12 14:35 | Machine | s1_win7_x6401 |
Filename | cbot.exe | ||
Type | PE32+ executable (GUI) x86-64, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | |||
VT API (file) | 42 detected (Reconyc, Malicious, score, Ghanarava, Unsafe, GenericKD, V9h8, confidence, 100%, Attribute, HighConfidence, moderate confidence, FileRepMalware, Misc, prwm, vUMVo8tikvP, kmzcd, Real Protect, high, Detected, Etset, Wacatac, ABTrojan, WMHZ, Artemis, Chgt, susgen, PossibleThreat, Phonzy, B9nj) | ||
md5 | 800dcb9f93715f5ed7189be2e35aebd9 | ||
sha256 | cff151ab7a8c0d221278758e76f71fc6c120d22bc39bf98daabfe1f450642a6f | ||
ssdeep | 1536:/LtDu076JchveHZHAsFXGDDkDNsJQ337Tcxg3cXf3NsMpphw6p0HP94Y8udRivy:TtD9+dHNAe2v8Ns67wg3af9skh4eS/i6 | ||
imphash | f09dfdec43a86f0214209d98673dd7a5 | ||
impfuzzy | 3:swBJAEPw1MO/OywS9KTXzhAXwEQaxRGUdJbJYbWmAgYbRWcWX6Dn:dBJAEoZ/OEGDzyRjJtYbK10X6D |
Network IP location
Signature (7cnts)
Level | Description |
---|---|
danger | File has been identified by 42 AntiVirus engines on VirusTotal as malicious |
danger | Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) |
watch | Communicates with host for which no DNS query was performed |
notice | Repeatedly searches for a not-found process |
notice | Searches running processes potentially to identify processes for sandbox evasion |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is compressed using UPX |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
info | IsPE64 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
PE API
IAT(Import Address Table) Library
KERNEL32.DLL
0x140081064 LoadLibraryA
0x14008106c ExitProcess
0x140081074 GetProcAddress
0x14008107c VirtualProtect
msvcrt.dll
0x14008108c atoi
SHELL32.dll
0x14008109c SHGetSpecialFolderPathA
WS2_32.dll
0x1400810ac ind
EAT(Export Address Table) is none
KERNEL32.DLL
0x140081064 LoadLibraryA
0x14008106c ExitProcess
0x140081074 GetProcAddress
0x14008107c VirtualProtect
msvcrt.dll
0x14008108c atoi
SHELL32.dll
0x14008109c SHGetSpecialFolderPathA
WS2_32.dll
0x1400810ac ind
EAT(Export Address Table) is none