ScreenShot
Created 2021.03.16 12:12 Machine s1_win7_x6402
Filename m80.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
1.6
ZERO API
VT API (file) 49 detected (GenericKD, Trickpak, TrickBot, Unsafe, malicious, confidence, 100%, ZedlaF, vu4@aW7PAmi, YFLG, inmjrr, BankerX, Eill, Malware@#17gck4vicjhb2, KillProc2, R066C0DBS21, Krypt, Kryptik, HJQZ, vgsvr, kcloud, score, ai score=82, CLOUD, Static AI, Malicious PE, susgen, PossibleThreat, GdSda, Hx4CgxsA)
md5 fcf94dfc58e09cace2777ad5e49e1dbc
sha256 f63b169e6589d2403bf32cca047ead493f0fb6490250366dbdff4b72384765b5
ssdeep 6144:bOIWW/GElfb6Nm+k+fWnYz7BHZiRCn9wzlZ0x:bOIvNfONXfyYzNZu49Yy
imphash f2c474e93666bbd585aa036f9c203ef8
impfuzzy 24:J1LjFthhlJnc+pl3eDoTYoSXaOovbOPZsvwjMM:J1LjFth5c+pp/YT3ck
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 49 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (9cnts)

Level Name Description Collection
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check Signature Zero binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasDebugData DebugData Check binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info IsPacked Entropy Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)
info win_files_operation Affect private profile binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure