ScreenShot
Created 2021.03.21 10:00 Machine s1_win7_x6402
Filename 22001.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
11
Behavior Score
0.8
ZERO API file : malware
VT API (file) 19 detected (malicious, high confidence, Unsafe, Save, Attribute, HighConfidence, ccmw, EncPk, Static AI, Malicious PE, Wacapew, score, BScope, TrojanPSW, Papras, Kryptik, HJZU, ET#87%, RDMK, cmRtazqihoMwCGyzJOO1bUAe27Cr, ZedlaF, hy4@aKtshZp)
md5 9a85e1eccf35e0c2e4f1b4764228e0f9
sha256 7857fb118ea676757804e373d4a743ad661b25e2f0aaef32ced6a68f0131568b
ssdeep 1536:sWVRLqnG1awzieRnGgpO7zzOTuwLvDCLonXIV6cDy7AKS4x8kXTZq9doUg:sgFHiirOnzO6wKtV5+7Znx/XTZqdo
imphash 6a037f055591c3dbbb16649e3c8fb605
impfuzzy 6:HGDYBJAEtwyRlbPp+TXWOBgvFtTXmGanWLl:mDoAPqPkXW80FNX9anm
  Network IP location

Signature (2cnts)

Level Description
watch File has been identified by 19 AntiVirus engines on VirusTotal as malicious
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure