ScreenShot
Created | 2025.02.18 18:31 | Machine | s1_win7_x6401 |
Filename | flilphbvd.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 57 detected (Coins, Malicious, score, Trojanpws, Lazy, Unsafe, Save, confidence, Genus, moderate confidence, a variant of WinGo, TrojanPSW, kvosxe, CLOUD, GenSteal, nclyi, Real Protect, high, Static AI, Malicious PE, Detected, GrayWare, Kryptik, Malware@#2r31htvs8r6gz, Multiverze, ABApplication, VJOF, R692058, Artemis, Ghoso, WinGo, Chgt, R002H09BC25, QQPass, QQRob, Yimw, susgen, Rozena) | ||
md5 | c45149f1e680fd612c2922e3ca2b2487 | ||
sha256 | d823f83f718b3b796d400c98e979776d05a81d99ae67603312eb17a1f627648d | ||
ssdeep | 49152:2Ew2RU9odArgTC69QsJ0rGwjYOa3iMckAIxRPKG9AVHrCpbi8EaqB8VCet:2E7UGdAkmaJEYOJ9IxRtgHm5zV | ||
imphash | 6ed4f5f04d62b18d96b26d6db7c18840 | ||
impfuzzy | 3:swBJAEPw1MO/OywS9KTXzhAXwEQaxRn:dBJAEoZ/OEGDzyRn |
Network IP location
Signature (4cnts)
Level | Description |
---|---|
danger | File has been identified by 57 AntiVirus engines on VirusTotal as malicious |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is compressed using UPX |
info | One or more processes crashed |
Rules (2cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.DLL
0xf25028 LoadLibraryA
0xf2502c ExitProcess
0xf25030 GetProcAddress
0xf25034 VirtualProtect
EAT(Export Address Table) is none
KERNEL32.DLL
0xf25028 LoadLibraryA
0xf2502c ExitProcess
0xf25030 GetProcAddress
0xf25034 VirtualProtect
EAT(Export Address Table) is none