ScreenShot
Created | 2025.04.29 10:39 | Machine | s1_win7_x6401 |
Filename | csr.bin | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 54 detected (AIDetectMalware, mE1c, Malicious, score, Ghanarava, Barys, Unsafe, Save, confidence, Attribute, HighConfidence, high confidence, FlyStudio, MalwareX, Misc, Babar, BlackHole, hqumcr, Occamy, lbQiteBw5lK, ATRAPS, Siggen31, Real Protect, high, Static AI, Suspicious PE, Detected, OV@6e1pyh, Wacatac, Eldorado, Artemis, BScope, MachineLearning, Anomalous, 100%, BlackMoon, R002H09DC25, Jajl, GenAsa, zBP+1MxmcWM, susgen, FlyApplication) | ||
md5 | b2a7f546295db73e03a857810f9334dc | ||
sha256 | 5e783f136301a88a436b279a406650225df0f1ad54cb7cc92c7fee518daa6ec3 | ||
ssdeep | 12288:RrC/RYEqX9wCLQXgdPLpAgXRQh8I3gG4:RcK9X7BkgX6hgG | ||
imphash | d831eced355e94699686b7b8d355a7b0 | ||
impfuzzy | 6:dBJAEHGDzyRlbRmVOZ/EwRgsyIBM9IVArrgeXw64LbtuISXmJJcJ1v4V:VA/DzqYOZ9RghIBAIV2rgxDutX+m1vY |
Network IP location
Signature (11cnts)
Level | Description |
---|---|
danger | File has been identified by 54 AntiVirus engines on VirusTotal as malicious |
watch | Installs itself for autorun at Windows startup |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Drops an executable to the user AppData folder |
notice | Foreign language identified in PE resource |
notice | Searches running processes potentially to identify processes for sandbox evasion |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | The executable uses a known packer |
info | The file contains an unknown PE resource name possibly indicative of a packer |
Rules (8cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | CoinMiner_IN | CoinMiner | binaries (download) |
danger | CoinMiner_IN | CoinMiner | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.DLL
0x51b4c4 LoadLibraryA
0x51b4c8 GetProcAddress
0x51b4cc VirtualProtect
0x51b4d0 VirtualAlloc
0x51b4d4 VirtualFree
0x51b4d8 ExitProcess
ADVAPI32.dll
0x51b4e0 RegCloseKey
COMCTL32.dll
0x51b4e8 None
comdlg32.dll
0x51b4f0 ChooseColorA
GDI32.dll
0x51b4f8 PatBlt
ole32.dll
0x51b500 OleRun
OLEAUT32.dll
0x51b508 UnRegisterTypeLib
SHELL32.dll
0x51b510 ShellExecuteA
USER32.dll
0x51b518 GetDC
WINMM.dll
0x51b520 waveOutOpen
WINSPOOL.DRV
0x51b528 ClosePrinter
WS2_32.dll
0x51b530 WSACleanup
EAT(Export Address Table) is none
KERNEL32.DLL
0x51b4c4 LoadLibraryA
0x51b4c8 GetProcAddress
0x51b4cc VirtualProtect
0x51b4d0 VirtualAlloc
0x51b4d4 VirtualFree
0x51b4d8 ExitProcess
ADVAPI32.dll
0x51b4e0 RegCloseKey
COMCTL32.dll
0x51b4e8 None
comdlg32.dll
0x51b4f0 ChooseColorA
GDI32.dll
0x51b4f8 PatBlt
ole32.dll
0x51b500 OleRun
OLEAUT32.dll
0x51b508 UnRegisterTypeLib
SHELL32.dll
0x51b510 ShellExecuteA
USER32.dll
0x51b518 GetDC
WINMM.dll
0x51b520 waveOutOpen
WINSPOOL.DRV
0x51b528 ClosePrinter
WS2_32.dll
0x51b530 WSACleanup
EAT(Export Address Table) is none