Report - gfdthawdddd.exe

PE File PE64
ScreenShot
Created 2025.03.28 09:30 Machine s1_win7_x6403
Filename gfdthawdddd.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
7
Behavior Score
1.4
ZERO API
VT API (file) 54 detected (AIDetectMalware, Miner, Malicious, score, FWHP, Tedy, Unsafe, CoinMiner, Kryptik, Vszr, confidence, 100%, Attribute, HighConfidence, Windows, Threat, Genkryptik, kwkdek, Staser, g2ZCviiLSKR, AGEN, Siggen31, Static AI, Malicious PE, Detected, Eldorado, DropperX, R622355, GdSda, PE04C9V, ln79aBUTstE, GQCB, RK8PHU)
md5 cb1ab881df77d5e59c9cd71a042489dd
sha256 23fa323eea0a8a6367e810996a54337197c1750a9a0a53c306c8c4022dd94780
ssdeep 98304:JiGUZDIMGpNQVgB6W9Yj1FbFKGZkZk0a51wYKZpptRA3x9JEY0UiHO5RcrNkjR:KGpNfB8pFbFK1G0a5k7A3LJGUiu5WJkd
imphash b237ac2118704db9e7609540658f5790
impfuzzy 12:FMHHGf5XGXKiEG6eGJyJk6lTpJqJZJVZJfMRJRJJoARZqRVPXJHqc:FMGf5XGf6ZgJkoDqnvZJfQfjBcV9
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 54 AntiVirus engines on VirusTotal as malicious
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
xmr-eu1.nanopool.org DE OVH SAS 51.89.23.91
xmr-eu2.nanopool.org FR OVH SAS 51.195.43.17
pastebin.com US CLOUDFLARENET 172.67.19.24
51.15.58.224 NL Online S.a.s. 51.15.58.224
163.172.171.111 GB Online S.a.s. 163.172.171.111
172.67.19.24 US CLOUDFLARENET 172.67.19.24

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x140016b00 __C_specific_handler
 0x140016b08 __getmainargs
 0x140016b10 __initenv
 0x140016b18 __iob_func
 0x140016b20 __set_app_type
 0x140016b28 __setusermatherr
 0x140016b30 _amsg_exit
 0x140016b38 _cexit
 0x140016b40 _commode
 0x140016b48 _fmode
 0x140016b50 _initterm
 0x140016b58 _onexit
 0x140016b60 _wcsicmp
 0x140016b68 _wcsnicmp
 0x140016b70 abort
 0x140016b78 calloc
 0x140016b80 exit
 0x140016b88 fprintf
 0x140016b90 free
 0x140016b98 fwrite
 0x140016ba0 malloc
 0x140016ba8 memcpy
 0x140016bb0 memset
 0x140016bb8 signal
 0x140016bc0 strcat
 0x140016bc8 strcpy
 0x140016bd0 strlen
 0x140016bd8 strncmp
 0x140016be0 strstr
 0x140016be8 vfprintf
 0x140016bf0 wcscat
 0x140016bf8 wcscpy
 0x140016c00 wcslen
 0x140016c08 wcsncmp
 0x140016c10 wcsstr
KERNEL32.dll
 0x140016c20 DeleteCriticalSection
 0x140016c28 EnterCriticalSection
 0x140016c30 GetLastError
 0x140016c38 InitializeCriticalSection
 0x140016c40 LeaveCriticalSection
 0x140016c48 SetUnhandledExceptionFilter
 0x140016c50 Sleep
 0x140016c58 TlsGetValue
 0x140016c60 VirtualProtect
 0x140016c68 VirtualQuery

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure