Report - DevMI.exe

Generic Malware PE File PE64
ScreenShot
Created 2025.02.05 11:25 Machine s1_win7_x6403
Filename DevMI.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
2.0
ZERO API file : malware
VT API (file) 59 detected (AIDetectMalware, Reflo, Malicious, score, Ghanarava, Artemis, Unsafe, Whisperer, confidence, 100%, GenusB, DGFE, high confidence, CrypterX, Tedy, Xmrig, Kryptik, tSjl4DNY5BP, AGEN, Siggen3, R011C0DJ424, Static AI, Malicious PE, Detected, GenKryptik, Malware@#17w52gkpjwpu4, Eldorado, R570072, Chgt, X8wxGA, susgen, GIIA)
md5 5f2f1ae240812065799e8c05d3a01aa7
sha256 adad69d9a6bf24c7739cc25cf4def1b96d05accc349ed86e9200d404c039ad03
ssdeep 98304:nFgc9lwquOMw7CRBgZXLzpYyAVIAPs0yFPJ+m0gfEOIdVZZMxy9/qbnbWYwhgI2Z:n2O6qLMwQKZXLzcqAPs08PJ+m0kEOIzi
imphash d3be2dc19ba54f7225d7679c3f791cf7
impfuzzy 24:1fPJx+kTdF0tWJd1jIlMblRf5XG6qXZgJkomvlA/GbtcqcJvZJF:1fPL+kT6kSslJJG6qJgk1vm/GbuqcJLF
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 59 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (3cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
xmr-eu1.nanopool.org FR Online S.a.s. 212.47.253.124 mailcious
146.59.154.106 Unknown 146.59.154.106 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1405c729c CloseHandle
 0x1405c72a4 CreateSemaphoreW
 0x1405c72ac DeleteCriticalSection
 0x1405c72b4 EnterCriticalSection
 0x1405c72bc GetCurrentThreadId
 0x1405c72c4 GetLastError
 0x1405c72cc GetStartupInfoA
 0x1405c72d4 InitializeCriticalSection
 0x1405c72dc IsDBCSLeadByteEx
 0x1405c72e4 LeaveCriticalSection
 0x1405c72ec MultiByteToWideChar
 0x1405c72f4 RaiseException
 0x1405c72fc ReleaseSemaphore
 0x1405c7304 RtlCaptureContext
 0x1405c730c RtlLookupFunctionEntry
 0x1405c7314 RtlUnwindEx
 0x1405c731c RtlVirtualUnwind
 0x1405c7324 SetLastError
 0x1405c732c SetUnhandledExceptionFilter
 0x1405c7334 Sleep
 0x1405c733c TlsAlloc
 0x1405c7344 TlsFree
 0x1405c734c TlsGetValue
 0x1405c7354 TlsSetValue
 0x1405c735c VirtualProtect
 0x1405c7364 VirtualQuery
 0x1405c736c WaitForSingleObject
 0x1405c7374 WideCharToMultiByte
msvcrt.dll
 0x1405c7384 __C_specific_handler
 0x1405c738c ___lc_codepage_func
 0x1405c7394 ___mb_cur_max_func
 0x1405c739c __getmainargs
 0x1405c73a4 __initenv
 0x1405c73ac __iob_func
 0x1405c73b4 __set_app_type
 0x1405c73bc __setusermatherr
 0x1405c73c4 _acmdln
 0x1405c73cc _amsg_exit
 0x1405c73d4 _cexit
 0x1405c73dc _commode
 0x1405c73e4 _errno
 0x1405c73ec _fmode
 0x1405c73f4 _initterm
 0x1405c73fc _onexit
 0x1405c7404 _wcsicmp
 0x1405c740c _wcsnicmp
 0x1405c7414 abort
 0x1405c741c calloc
 0x1405c7424 exit
 0x1405c742c fprintf
 0x1405c7434 fputc
 0x1405c743c fputs
 0x1405c7444 fputwc
 0x1405c744c free
 0x1405c7454 fwprintf
 0x1405c745c fwrite
 0x1405c7464 localeconv
 0x1405c746c malloc
 0x1405c7474 memcpy
 0x1405c747c memset
 0x1405c7484 realloc
 0x1405c748c signal
 0x1405c7494 strcat
 0x1405c749c strcmp
 0x1405c74a4 strerror
 0x1405c74ac strlen
 0x1405c74b4 strncmp
 0x1405c74bc strstr
 0x1405c74c4 vfprintf
 0x1405c74cc wcscat
 0x1405c74d4 wcscpy
 0x1405c74dc wcslen
 0x1405c74e4 wcsncmp
 0x1405c74ec wcsstr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure