Report - raw_cbot.exe

PE File PE64
ScreenShot
Created 2025.04.02 10:00 Machine s1_win7_x6403
Filename raw_cbot.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
7
Behavior Score
2.6
ZERO API file : malware
VT API (file) 27 detected (AIDetectMalware, Barys, Unsafe, Save, malicious, confidence, Attribute, HighConfidence, moderate confidence, Reconyc, yWTlHXg2EDG, high, score, Detected, Wacapew, Pzfl)
md5 ac00294c21bca514a06403c4853fd4c9
sha256 058ae6f35de80b39b0199767b87e83be9c4f98bb9c2d11e2fca178b115dec078
ssdeep 384:lZet5YKgVx3kt/3QhCWdhpx902uz7QiAzdxlhcNv2z/zT3/asw8Kl1P25ABSLmkw:nK5Y1vs/+Cqiz8HrcKLh2S17PEs+l
imphash 4b2df774f65211b4962a056c4da67248
impfuzzy 3:oTEDoA0PLsWBJAEPw1MO/OywS9KTXzhAXwEQaxRGUdJbJYbWmAgYbRWcWX6Dn:oHBJAEoZ/OEGDzyRjJtYbK10X6D
  Network IP location

Signature (4cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
cbot.galaxias.cc Unknown 176.65.142.252 clean
176.65.142.252 Unknown 176.65.142.252 malware

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x14001942c CryptGenRandom
KERNEL32.DLL
 0x14001943c LoadLibraryA
 0x140019444 ExitProcess
 0x14001944c GetProcAddress
 0x140019454 VirtualProtect
msvcrt.dll
 0x140019464 atoi
SHELL32.dll
 0x140019474 SHGetSpecialFolderPathA
WS2_32.dll
 0x140019484 ind

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure