Report - cbot_debug.exe

PE File PE64
ScreenShot
Created 2025.04.02 09:57 Machine s1_win7_x6401
Filename cbot_debug.exe
Type PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
2.4
ZERO API file : clean
VT API (file) 15 detected (Unsafe, Save, malicious, confidence, Reconyc, yWTlHXg2EDG, score, Detected, Wacapew, Barys, Kjgl)
md5 55e5364c24cbe9979dbb77e2a6370a8d
sha256 144f8bf9369a83dd2d778ac51e1b1aaba25e2c25e12ecb9644a76f9bb3c18432
ssdeep 384:OZet5YKgVx3kt/3QhCWdhpx902uz7QiAzdxlhcNv2z/zT3/asw8Kl1P25ABSLmkX:EK5Y1vs/+Cqiz8HrcKLh2S170seE
imphash 4b2df774f65211b4962a056c4da67248
impfuzzy 3:oTEDoA0PLsWBJAEPw1MO/OywS9KTXzhAXwEQaxRGUdJbJYbWmAgYbRWcWX6Dn:oHBJAEoZ/OEGDzyRjJtYbK10X6D
  Network IP location

Signature (4cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch File has been identified by 15 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
cbot.galaxias.cc Unknown 176.65.142.252 clean
176.65.142.252 Unknown 176.65.142.252 malware

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x14001942c CryptGenRandom
KERNEL32.DLL
 0x14001943c LoadLibraryA
 0x140019444 ExitProcess
 0x14001944c GetProcAddress
 0x140019454 VirtualProtect
msvcrt.dll
 0x140019464 atoi
SHELL32.dll
 0x140019474 SHGetSpecialFolderPathA
WS2_32.dll
 0x140019484 ind

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure