Report - cbot.exe

PE File PE64
ScreenShot
Created 2025.04.02 09:55 Machine s1_win7_x6403
Filename cbot.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
3.0
ZERO API file : malware
VT API (file) 26 detected (AIDetectMalware, Barys, Unsafe, Save, malicious, confidence, moderate confidence, Reconyc, yWTlHXg2EDG, score, Detected, Wacapew, Edhl)
md5 cbb0a9271f42274b0455094768ca416d
sha256 3651de48c64d4481ac5d7f1da072d4f9c29b2e9a691acfa7205061543c355633
ssdeep 384:fZet5YKgVx3kt/3QhCWdhpx902uz7QiAzdxlhcNv2z/zT3/asw8Kl1P25ABSLmki:xK5Y1vs/+Cqiz8HrcKLh2S17qsel
imphash 4b2df774f65211b4962a056c4da67248
impfuzzy 3:oTEDoA0PLsWBJAEPw1MO/OywS9KTXzhAXwEQaxRGUdJbJYbWmAgYbRWcWX6Dn:oHBJAEoZ/OEGDzyRjJtYbK10X6D
  Network IP location

Signature (5cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
notice Resolves a suspicious Top Level Domain (TLD)
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
cbot.galaxias.cc Unknown 176.65.142.252 clean
176.65.142.252 Unknown 176.65.142.252 malware

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x14001942c CryptGenRandom
KERNEL32.DLL
 0x14001943c LoadLibraryA
 0x140019444 ExitProcess
 0x14001944c GetProcAddress
 0x140019454 VirtualProtect
msvcrt.dll
 0x140019464 atoi
SHELL32.dll
 0x140019474 SHGetSpecialFolderPathA
WS2_32.dll
 0x140019484 ind

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure