Report - ssh.exe

Generic Malware Malicious Library Malicious Packer UPX PE File PE64 OS Processor Check
ScreenShot
Created 2025.02.20 03:15 Machine s1_win7_x6401
Filename ssh.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
1
Behavior Score
0.2
ZERO API file : clean
VT API (file)
md5 543fb58aa3b9120623a46dd6503f4688
sha256 b235aa64234d7e5bf7159b2744e05a04d7aa6edd54a7678e488809299f776bfc
ssdeep 24576:V1b0BgFerkytL0LPUu9mxz8H1pUgqf0VX7JC/Z4spw8hrF:V1b2gMrLgLPUuAxSpdq07gvw8h
imphash 977eb4c263d384e47daa0712d34713ab
impfuzzy 192:peJxfPE5ZQjfy/KlE7fFW5h3ZAPqs742v5BE:peJxfPE5ZQjf6KlE7fFuhJAPqsU
  Network IP location

Signature (1cnts)

Level Description
info This executable has a PDB path

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

libcrypto.dll
 0x1400d6798 DSA_SIG_new
 0x1400d67a0 DSA_set0_pqg
 0x1400d67a8 DSA_get0_pqg
 0x1400d67b0 DSA_generate_key
 0x1400d67b8 DSA_SIG_get0
 0x1400d67c0 DSA_set0_key
 0x1400d67c8 DSA_do_verify
 0x1400d67d0 DSA_generate_parameters_ex
 0x1400d67d8 BN_bn2bin
 0x1400d67e0 DSA_get0_key
 0x1400d67e8 DSA_do_sign
 0x1400d67f0 DSA_free
 0x1400d67f8 DSA_SIG_free
 0x1400d6800 BN_dup
 0x1400d6808 RSA_generate_key_ex
 0x1400d6810 BN_set_flags
 0x1400d6818 RSA_public_decrypt
 0x1400d6820 RSA_set0_crt_params
 0x1400d6828 BN_set_word
 0x1400d6830 RSA_sign
 0x1400d6838 BN_div
 0x1400d6840 RSA_set0_factors
 0x1400d6848 RSA_get0_factors
 0x1400d6850 RSA_get0_crt_params
 0x1400d6858 BN_CTX_new
 0x1400d6860 EC_POINT_clear_free
 0x1400d6868 ECDH_compute_key
 0x1400d6870 BN_CTX_free
 0x1400d6878 ECDSA_do_sign
 0x1400d6880 EC_POINT_cmp
 0x1400d6888 DH_generate_key
 0x1400d6890 EC_KEY_generate_key
 0x1400d6898 ECDSA_SIG_get0
 0x1400d68a0 EC_KEY_set_public_key
 0x1400d68a8 EC_KEY_set_asn1_flag
 0x1400d68b0 ECDSA_do_verify
 0x1400d68b8 EC_KEY_new_by_curve_name
 0x1400d68c0 DSA_SIG_set0
 0x1400d68c8 DH_get0_pqg
 0x1400d68d0 RAND_status
 0x1400d68d8 OpenSSL_version_num
 0x1400d68e0 EC_KEY_METHOD_set_sign
 0x1400d68e8 RSAPublicKey_dup
 0x1400d68f0 X509_get_pubkey
 0x1400d68f8 EC_KEY_set_method
 0x1400d6900 DH_set0_pqg
 0x1400d6908 RSA_meth_set_priv_enc
 0x1400d6910 BN_is_negative
 0x1400d6918 o2i_ECPublicKey
 0x1400d6920 d2i_ECPKParameters
 0x1400d6928 EC_KEY_METHOD_get_sign
 0x1400d6930 RSA_meth_set1_name
 0x1400d6938 d2i_ASN1_OCTET_STRING
 0x1400d6940 RSA_new
 0x1400d6948 RSA_free
 0x1400d6950 d2i_X509
 0x1400d6958 d2i_X509_NAME
 0x1400d6960 BN_free
 0x1400d6968 ECDSA_size
 0x1400d6970 EC_KEY_get_ex_data
 0x1400d6978 EC_KEY_set_ex_data
 0x1400d6980 X509_NAME_free
 0x1400d6988 RSA_set_method
 0x1400d6990 EVP_PKEY_get0_EC_KEY
 0x1400d6998 EVP_PKEY_get0_RSA
 0x1400d69a0 RSA_meth_dup
 0x1400d69a8 ECDSA_SIG_free
 0x1400d69b0 RSA_set_ex_data
 0x1400d69b8 ERR_error_string
 0x1400d69c0 EC_KEY_new
 0x1400d69c8 RSA_size
 0x1400d69d0 DH_new
 0x1400d69d8 RSA_get_ex_data
 0x1400d69e0 DH_set_length
 0x1400d69e8 RSA_get_default_method
 0x1400d69f0 RSA_get_ex_new_index
 0x1400d69f8 BN_hex2bn
 0x1400d6a00 RSA_meth_set_priv_dec
 0x1400d6a08 ECDSA_SIG_set0
 0x1400d6a10 BN_is_bit_set
 0x1400d6a18 X509_free
 0x1400d6a20 X509_NAME_oneline
 0x1400d6a28 RSA_set0_key
 0x1400d6a30 arc4random_buf
 0x1400d6a38 EC_POINT_point2oct
 0x1400d6a40 EC_POINT_oct2point
 0x1400d6a48 CRYPTO_get_ex_new_index
 0x1400d6a50 ASN1_OCTET_STRING_free
 0x1400d6a58 EC_KEY_METHOD_new
 0x1400d6a60 EC_KEY_dup
 0x1400d6a68 EC_KEY_OpenSSL
 0x1400d6a70 ECDSA_SIG_new
 0x1400d6a78 BN_bin2bn
 0x1400d6a80 EVP_CIPHER_CTX_key_length
 0x1400d6a88 EVP_CIPHER_CTX_new
 0x1400d6a90 EVP_aes_256_cbc
 0x1400d6a98 AES_set_encrypt_key
 0x1400d6aa0 AES_encrypt
 0x1400d6aa8 DSA_new
 0x1400d6ab0 DH_size
 0x1400d6ab8 DH_compute_key
 0x1400d6ac0 EVP_CipherInit
 0x1400d6ac8 DH_get0_key
 0x1400d6ad0 EC_GROUP_get_degree
 0x1400d6ad8 EC_KEY_set_private_key
 0x1400d6ae0 EVP_aes_128_ctr
 0x1400d6ae8 EVP_aes_256_ctr
 0x1400d6af0 EVP_des_ede3_cbc
 0x1400d6af8 EVP_aes_192_cbc
 0x1400d6b00 EVP_CIPHER_CTX_ctrl
 0x1400d6b08 EVP_CIPHER_CTX_set_key_length
 0x1400d6b10 EVP_aes_192_ctr
 0x1400d6b18 EVP_Cipher
 0x1400d6b20 EVP_aes_256_gcm
 0x1400d6b28 EVP_aes_128_gcm
 0x1400d6b30 EVP_CIPHER_CTX_free
 0x1400d6b38 EVP_sha384
 0x1400d6b40 EVP_MD_CTX_copy_ex
 0x1400d6b48 EVP_MD_CTX_new
 0x1400d6b50 EVP_md5
 0x1400d6b58 EVP_sha256
 0x1400d6b60 EVP_DigestUpdate
 0x1400d6b68 EVP_Digest
 0x1400d6b70 EVP_MD_CTX_free
 0x1400d6b78 EVP_DigestInit_ex
 0x1400d6b80 EVP_MD_CTX_md
 0x1400d6b88 EVP_sha1
 0x1400d6b90 EVP_MD_block_size
 0x1400d6b98 EVP_sha512
 0x1400d6ba0 EVP_DigestFinal_ex
 0x1400d6ba8 DH_free
 0x1400d6bb0 EC_KEY_free
 0x1400d6bb8 RSA_blinding_on
 0x1400d6bc0 EC_GROUP_get_order
 0x1400d6bc8 BIO_new
 0x1400d6bd0 BN_clear_free
 0x1400d6bd8 ERR_peek_error
 0x1400d6be0 BN_value_one
 0x1400d6be8 EVP_PKEY_get1_EC_KEY
 0x1400d6bf0 EC_METHOD_get_field_type
 0x1400d6bf8 EC_POINT_mul
 0x1400d6c00 ERR_get_error
 0x1400d6c08 EC_POINT_get_affine_coordinates_GFp
 0x1400d6c10 ERR_peek_last_error
 0x1400d6c18 EC_KEY_set_group
 0x1400d6c20 EC_POINT_is_at_infinity
 0x1400d6c28 BIO_s_mem
 0x1400d6c30 RSA_get0_key
 0x1400d6c38 PEM_read_bio_PrivateKey
 0x1400d6c40 EC_POINT_free
 0x1400d6c48 EVP_aes_128_cbc
 0x1400d6c50 EVP_PKEY_free
 0x1400d6c58 EVP_PKEY_get1_RSA
 0x1400d6c60 EC_KEY_get0_public_key
 0x1400d6c68 EC_GROUP_free
 0x1400d6c70 EC_POINT_new
 0x1400d6c78 BIO_write
 0x1400d6c80 BIO_free
 0x1400d6c88 EC_GROUP_cmp
 0x1400d6c90 EVP_PKEY_get1_DSA
 0x1400d6c98 EC_GROUP_set_asn1_flag
 0x1400d6ca0 EC_GROUP_get_curve_name
 0x1400d6ca8 BN_new
 0x1400d6cb0 EC_KEY_get0_private_key
 0x1400d6cb8 EC_KEY_get0_group
 0x1400d6cc0 BN_cmp
 0x1400d6cc8 BN_sub
 0x1400d6cd0 EC_GROUP_new_by_curve_name
 0x1400d6cd8 EVP_PKEY_base_id
 0x1400d6ce0 EC_GROUP_method_of
 0x1400d6ce8 BN_num_bits
 0x1400d6cf0 gettimeofday
 0x1400d6cf8 OpenSSL_version
 0x1400d6d00 explicit_bzero
 0x1400d6d08 arc4random_uniform
WS2_32.dll
 0x1400d66a8 ntohl
 0x1400d66b0 htons
 0x1400d66b8 getnameinfo
 0x1400d66c0 WSAGetLastError
 0x1400d66c8 inet_ntoa
 0x1400d66d0 inet_ntop
 0x1400d66d8 ntohs
 0x1400d66e0 getservbyname
 0x1400d66e8 htonl
 0x1400d66f0 WSACleanup
 0x1400d66f8 FreeAddrInfoW
 0x1400d6700 ind
 0x1400d6708 WSASocketW
 0x1400d6710 WSAIoctl
 0x1400d6718 WSASend
 0x1400d6720 WSADuplicateSocketW
 0x1400d6728 closesocket
 0x1400d6730 shutdown
 0x1400d6738 listen
 0x1400d6740 setsockopt
 0x1400d6748 WSAGetOverlappedResult
 0x1400d6750 getsockopt
 0x1400d6758 WSARecv
 0x1400d6760 GetAddrInfoW
 0x1400d6768 gethostname
 0x1400d6770 socket
 0x1400d6778 getsockname
 0x1400d6780 getpeername
 0x1400d6788 WSAStartup
KERNEL32.dll
 0x1400d6130 FileTimeToSystemTime
 0x1400d6138 SystemTimeToTzSpecificLocalTime
 0x1400d6140 PeekNamedPipe
 0x1400d6148 FreeLibraryAndExitThread
 0x1400d6150 ExitThread
 0x1400d6158 CreateThread
 0x1400d6160 GetCommandLineW
 0x1400d6168 GetCommandLineA
 0x1400d6170 GetCurrentDirectoryW
 0x1400d6178 SetEnvironmentVariableW
 0x1400d6180 DeleteFileW
 0x1400d6188 GetFullPathNameW
 0x1400d6190 SetFileAttributesW
 0x1400d6198 RemoveDirectoryW
 0x1400d61a0 SetStdHandle
 0x1400d61a8 ExitProcess
 0x1400d61b0 RtlPcToFileHeader
 0x1400d61b8 RaiseException
 0x1400d61c0 EncodePointer
 0x1400d61c8 TlsFree
 0x1400d61d0 TlsSetValue
 0x1400d61d8 TlsGetValue
 0x1400d61e0 TlsAlloc
 0x1400d61e8 InitializeCriticalSectionAndSpinCount
 0x1400d61f0 DeleteCriticalSection
 0x1400d61f8 LeaveCriticalSection
 0x1400d6200 EnterCriticalSection
 0x1400d6208 SetLastError
 0x1400d6210 RtlUnwindEx
 0x1400d6218 GetModuleHandleW
 0x1400d6220 GetStartupInfoW
 0x1400d6228 IsDebuggerPresent
 0x1400d6230 InitializeSListHead
 0x1400d6238 GetSystemTimeAsFileTime
 0x1400d6240 QueryPerformanceCounter
 0x1400d6248 IsProcessorFeaturePresent
 0x1400d6250 SetUnhandledExceptionFilter
 0x1400d6258 UnhandledExceptionFilter
 0x1400d6260 RtlVirtualUnwind
 0x1400d6268 RtlLookupFunctionEntry
 0x1400d6270 RtlCaptureContext
 0x1400d6278 FindClose
 0x1400d6280 FindFirstFileExW
 0x1400d6288 HeapFree
 0x1400d6290 CancelIoEx
 0x1400d6298 CancelSynchronousIo
 0x1400d62a0 WriteFile
 0x1400d62a8 ReadFile
 0x1400d62b0 CreateWaitableTimerA
 0x1400d62b8 LoadLibraryExW
 0x1400d62c0 FlsAlloc
 0x1400d62c8 FlsGetValue
 0x1400d62d0 FlsSetValue
 0x1400d62d8 FlsFree
 0x1400d62e0 GetDateFormatW
 0x1400d62e8 GetTimeFormatW
 0x1400d62f0 CompareStringW
 0x1400d62f8 LCMapStringW
 0x1400d6300 GetFinalPathNameByHandleW
 0x1400d6308 FindNextFileW
 0x1400d6310 GetDriveTypeW
 0x1400d6318 GetDiskFreeSpaceExW
 0x1400d6320 GetLogicalDriveStringsW
 0x1400d6328 ReadFileEx
 0x1400d6330 GetFileAttributesExW
 0x1400d6338 GetFileInformationByHandle
 0x1400d6340 WriteFileEx
 0x1400d6348 DeviceIoControl
 0x1400d6350 CreateNamedPipeA
 0x1400d6358 CancelIo
 0x1400d6360 WaitForSingleObjectEx
 0x1400d6368 WaitForMultipleObjectsEx
 0x1400d6370 QueueUserAPC
 0x1400d6378 SetConsoleCtrlHandler
 0x1400d6380 ReadConsoleOutputA
 0x1400d6388 SetConsoleCursorPosition
 0x1400d6390 GetConsoleWindow
 0x1400d6398 SetConsoleCP
 0x1400d63a0 Beep
 0x1400d63a8 WriteConsoleW
 0x1400d63b0 PeekConsoleInputW
 0x1400d63b8 FillConsoleOutputAttribute
 0x1400d63c0 WriteConsoleOutputA
 0x1400d63c8 CreateFileA
 0x1400d63d0 ReadConsoleInputW
 0x1400d63d8 SetConsoleCursorInfo
 0x1400d63e0 GetConsoleMode
 0x1400d63e8 SetConsoleWindowInfo
 0x1400d63f0 GetConsoleCP
 0x1400d63f8 GetConsoleCursorInfo
 0x1400d6400 ScrollConsoleScreenBufferA
 0x1400d6408 SetConsoleScreenBufferSize
 0x1400d6410 SetConsoleTextAttribute
 0x1400d6418 FillConsoleOutputCharacterA
 0x1400d6420 MultiByteToWideChar
 0x1400d6428 GetSystemTime
 0x1400d6430 CreatePipe
 0x1400d6438 GetModuleHandleExW
 0x1400d6440 GetWindowsDirectoryW
 0x1400d6448 GetSystemDirectoryW
 0x1400d6450 IsValidCodePage
 0x1400d6458 GetACP
 0x1400d6460 ExpandEnvironmentStringsW
 0x1400d6468 GetOEMCP
 0x1400d6470 GetCPInfo
 0x1400d6478 GetEnvironmentStringsW
 0x1400d6480 CreateEventA
 0x1400d6488 VerifyVersionInfoW
 0x1400d6490 SleepEx
 0x1400d6498 VerSetConditionMask
 0x1400d64a0 ResetEvent
 0x1400d64a8 SetEvent
 0x1400d64b0 FlushFileBuffers
 0x1400d64b8 OpenThread
 0x1400d64c0 CreateProcessW
 0x1400d64c8 SetFilePointerEx
 0x1400d64d0 GetTickCount64
 0x1400d64d8 DuplicateHandle
 0x1400d64e0 GetCurrentThreadId
 0x1400d64e8 SetEndOfFile
 0x1400d64f0 HeapAlloc
 0x1400d64f8 FreeEnvironmentStringsW
 0x1400d6500 SetHandleInformation
 0x1400d6508 GetFileType
 0x1400d6510 WideCharToMultiByte
 0x1400d6518 FreeLibrary
 0x1400d6520 GetComputerNameW
 0x1400d6528 MoveFileExW
 0x1400d6530 LocalFree
 0x1400d6538 GetProcAddress
 0x1400d6540 GetTimeZoneInformation
 0x1400d6548 LoadLibraryW
 0x1400d6550 FreeConsole
 0x1400d6558 HeapReAlloc
 0x1400d6560 RtlUnwind
 0x1400d6568 GetLastError
 0x1400d6570 GetFileSizeEx
 0x1400d6578 FormatMessageW
 0x1400d6580 GetStringTypeW
 0x1400d6588 Sleep
 0x1400d6590 CreateFileW
 0x1400d6598 GetConsoleOutputCP
 0x1400d65a0 SetConsoleMode
 0x1400d65a8 SetConsoleOutputCP
 0x1400d65b0 GetModuleFileNameW
 0x1400d65b8 GetNumberOfConsoleInputEvents
 0x1400d65c0 FormatMessageA
 0x1400d65c8 TerminateProcess
 0x1400d65d0 WaitForSingleObject
 0x1400d65d8 CloseHandle
 0x1400d65e0 GetCurrentProcessId
 0x1400d65e8 GetExitCodeProcess
 0x1400d65f0 PeekConsoleInputA
 0x1400d65f8 CreateDirectoryW
 0x1400d6600 ReadConsoleW
 0x1400d6608 GetConsoleScreenBufferInfo
 0x1400d6610 GetProcessHeap
 0x1400d6618 GetCurrentProcess
 0x1400d6620 GetStdHandle
 0x1400d6628 HeapSize
 0x1400d6630 GetLocalTime
 0x1400d6638 CreateHardLinkW
ADVAPI32.dll
 0x1400d6000 CopySid
 0x1400d6008 EventWrite
 0x1400d6010 ConvertStringSecurityDescriptorToSecurityDescriptorW
 0x1400d6018 GetLengthSid
 0x1400d6020 IsValidAcl
 0x1400d6028 LookupAccountNameW
 0x1400d6030 IsValidSecurityDescriptor
 0x1400d6038 GetTokenInformation
 0x1400d6040 IsWellKnownSid
 0x1400d6048 IsValidSid
 0x1400d6050 GetNamedSecurityInfoW
 0x1400d6058 CreateWellKnownSid
 0x1400d6060 GetAce
 0x1400d6068 CreateProcessAsUserW
 0x1400d6070 GetSidIdentifierAuthority
 0x1400d6078 RegQueryValueExW
 0x1400d6080 LookupAccountSidW
 0x1400d6088 ConvertSidToStringSidW
 0x1400d6090 RegOpenKeyExW
 0x1400d6098 RegCloseKey
 0x1400d60a0 EventUnregister
 0x1400d60a8 EventRegister
 0x1400d60b0 EventWriteTransfer
 0x1400d60b8 OpenProcessToken
 0x1400d60c0 LsaNtStatusToWinError
 0x1400d60c8 FreeSid
 0x1400d60d0 CreateRestrictedToken
 0x1400d60d8 LookupPrivilegeValueA
 0x1400d60e0 AllocateAndInitializeSid
 0x1400d60e8 EqualSid
 0x1400d60f0 AllocateLocallyUniqueId
 0x1400d60f8 AdjustTokenPrivileges
 0x1400d6100 LsaManageSidNameMapping
 0x1400d6108 ConvertSidToStringSidA
CRYPT32.dll
 0x1400d6118 CryptBinaryToStringA
 0x1400d6120 CryptStringToBinaryA
Secur32.dll
 0x1400d6648 InitSecurityInterfaceW
 0x1400d6650 LsaFreeReturnBuffer
 0x1400d6658 LsaLookupAuthenticationPackage
 0x1400d6660 LsaRegisterLogonProcess
 0x1400d6668 LsaLogonUser
 0x1400d6670 LsaDeregisterLogonProcess
USER32.dll
 0x1400d6680 ShowWindow
 0x1400d6688 GetWindowPlacement
USERENV.dll
 0x1400d6698 LoadUserProfileW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure