ScreenShot
Created 2021.03.23 17:58 Machine s1_win7_x6402
Filename 14111.txt
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
12
Behavior Score
1.6
ZERO API file : clean
VT API (file) 56 detected (AIDetect, malware1, malicious, high confidence, Razy, Dofoil, Unsafe, Save, Smokeloader, Eldorado, Attribute, HighConfidence, Zurgop, fednlb, Ajly, A + Mal, Behav, Winwebsec, VirRansom, cgmcl, XPACK, score, R223509, GenericRXGK, ai score=83, TScope, CLOUD, QHrJybMuK6s, Static AI, Malicious PE, 100%, confidence, HxMB0ScA)
md5 76ca2bd487ce34419aeb0707ab79c686
sha256 bca81c611dc8f8505de5cab900d0c1460a9929187e0b1359807d0c869bbf2a66
ssdeep 768:FrqQ7AmV3rjBkyo1bGk/8K9hWkiwtwTxC+YASD+30UYlyKQAth:F33k6Z3JFCnAmD++
imphash
impfuzzy 3::
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 56 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (6cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info FASM http://flatassembler.net binaries (upload)
info ImportTableIsBad ImportTable Check binaries (upload)
info IsPacked Entropy Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) is none

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure