Report - 1.exe

Generic Malware PE File PE64
ScreenShot
Created 2025.03.08 12:24 Machine s1_win7_x6401
Filename 1.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
11
Behavior Score
1.6
ZERO API file : malware
VT API (file) 60 detected (AIDetectMalware, Donut, Malicious, score, Ghanarava, GenericKDZ, Unsafe, Save, confidence, 100%, Genus, high confidence, kvqnsc, Kryptik, CLASSIC, wveom, DownLoader6, Static AI, Suspicious PE, Detected, Eldorado, R444976, susgen)
md5 64d97ceac5d0fbb39f316eb8707c5af4
sha256 3cef6251ea6a26aaf56f933a3ef27b6b1b20d591a3cac9816ac5d850cd3a51c9
ssdeep 768:517muhL+HZOtOKK7q5xEHXXIYRIeAsFKYuG:L7xLg0OKmq5KnfRo
imphash 02549ff92b49cce693542fc9afb10102
impfuzzy 6:HMJqX0syYJxSBS0H5sD4sIWvXoFliPEcn:sJqGMY58E6PXn
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 60 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (3cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x408b6c malloc
 0x408b74 memset
 0x408b7c _get_pgmptr
 0x408b84 getenv
 0x408b8c sprintf
 0x408b94 __argc
 0x408b9c __argv
 0x408ba4 _environ
 0x408bac _XcptFilter
 0x408bb4 __set_app_type
 0x408bbc _controlfp
 0x408bc4 __getmainargs
 0x408bcc exit
kernel32.dll
 0x408bdc Sleep
 0x408be4 CreateProcessA
 0x408bec SetUnhandledExceptionFilter

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure