Report - laserrr.exe

Generic Malware Malicious Library UPX PE File PE64 PE32 DLL
ScreenShot
Created 2025.02.07 14:20 Machine s1_win7_x6403
Filename laserrr.exe
Type PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
AI Score
7
Behavior Score
9.6
ZERO API file : malware
VT API (file) 51 detected (AIDetectMalware, TinyDow, Malicious, score, TRFH1151, Discord, Jalapeno, Unsafe, confidence, 100%, Attribute, HighConfidence, high confidence, DropperX, Msilzilla, Tasker, AGEN, DownLoaderNET, R002C0DB625, moderate, Dloadr, Static AI, Malicious PE, Detected, Eldorado, Ader, Fflw, Tiny, A9OKG)
md5 3c723a1f7fb2d94308da84750fc7a75c
sha256 a39e8533d1876c66958064d71572e8eb233b09dc4fc2488a07a1c03601f98e9e
ssdeep 3072:Dp7N4kUfzbspKNMOccF6l3iMAelbWTz6aLYXDMx4:DVNXUMyMOUIGbWxS
imphash
impfuzzy 3::
  Network IP location

Signature (18cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 51 AntiVirus engines on VirusTotal as malicious
watch Attempts to identify installed AV products by installation directory
watch Communicates with host for which no DNS query was performed
watch Drops a binary and executes it
watch Manipulates memory of a non-child process indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info Checks if process is being debugged by a debugger

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch UPX_Zero UPX packed file binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (18cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://www.l63339.xyz/vhr7/?8eahTb_=iaSfD1StI7hDT4qLO8uUiRMZCfzOjk7n7gYmLjmbAGxKTACTDmsojAseBTws2ae3nsJ7oX723eTW3ctEzpxpoAGWw5lYsZyjnFbtqE7RDBWvF3wnDTau3wgNIBcGnVL27k7EtEM=&00Dj=kNZ8XRK0WV US ANT-CLOUD 162.218.30.235 clean
http://www.lucynoel6465.shop/jgkl/?8eahTb_=hI+cEEoDMRK5HtHm9IZKcVLqeO4rH3Lo+nuR9x41ri89hVkyLZ4bcwu1mex5brSMZV4GWavlrf0/NsblmXI4eKNzhD3LBC/4pVsqqx1rwhcrHMghz/r2elc8myKvxM7B12e/f+g=&00Dj=kNZ8XRK0WV US CLOUDFLARENET 104.21.32.1 clean
http://www.lucynoel6465.shop/jgkl/ US CLOUDFLARENET 104.21.32.1 clean
http://www.sqlite.org/2022/sqlite-dll-win32-x86-3380000.zip US Linode, LLC 45.33.6.223 clean
http://www.tumbetgirislinki.fit/k566/ US CLOUDFLARENET 104.21.32.1 clean
http://www.tumbetgirislinki.fit/k566/?8eahTb_=RARW43WNMKajmHobr0h+FYOVnPeo69WXvXreCHJ6fEp5jkldk9mcfHn6UnU82+9OdsowyVV8wlYPh4e4mYqP64YSjghMuBr0WoXV5avhz1caW9rj8asJcaLGlYzIq2qtHDCYWJw=&00Dj=kNZ8XRK0WV US CLOUDFLARENET 104.21.32.1 clean
http://87.120.120.56/crypt/laser.exe BG Yuri Jordanov Ltd. 87.120.120.56 malware
http://www.l63339.xyz/vhr7/ US ANT-CLOUD 162.218.30.235 clean
www.l63339.xyz US ANT-CLOUD 162.218.30.235 clean
www.tumbetgirislinki.fit US CLOUDFLARENET 104.21.16.1 clean
www.lucynoel6465.shop US CLOUDFLARENET 104.21.32.1 clean
www.seasay.xyz NZ Voyager Internet Ltd. 103.106.67.112 clean
162.218.30.235 US ANT-CLOUD 162.218.30.235 clean
104.21.16.1 US CLOUDFLARENET 104.21.16.1 malware
45.33.6.223 US Linode, LLC 45.33.6.223 clean
103.106.67.112 NZ Voyager Internet Ltd. 103.106.67.112 clean
104.21.48.1 US CLOUDFLARENET 104.21.48.1 malware
87.120.120.56 BG Yuri Jordanov Ltd. 87.120.120.56 mailcious

Suricata ids

PE API

IAT(Import Address Table) is none

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure