Report - date.php

Emotet Gen
ScreenShot
Created 2021.03.26 15:10 Machine s1_win7_x6401
Filename date.php
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
9.4
ZERO API file : clean
VT API (file) 11 detected (malicious, confidence, Trickbot, kcloud, score, ZedlaF, 1C8@aOkxFIbi)
md5 ab70894ecc3d92c51f4086a1253bebb9
sha256 9097b0addfbac3065c0500e637ad4828600ece935a114066a948a373d9509c8a
ssdeep 12288:FKpZxzCC6mtUhLcr7VQpT9LOa/PnWuRqjs6q1Jue/:uZxzy8UZcr7mp1Oa/vW2qjUue
imphash d67c6544c40a9b57c0097eff8761d7e6
impfuzzy 192:FAaww+FU/3lu2QUoZ0Qt9pVTQRsTvcncOc4sT:vQU/38UupWmaNls
  Network IP location

Signature (21cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
warning Generates some ICMP traffic
watch Communicates with host for which no DNS query was performed
watch File has been identified by 11 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice Creates hidden or system file
notice Foreign language identified in PE resource
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Terminates another process
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (14cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_1_Zero Win32 Trojan Emotet binaries (upload)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check Signature Zero binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasDebugData DebugData Check binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)
info keylogger Run a keylogger binaries (upload)
info screenshot Take screenshot binaries (upload)
info win_files_operation Affect private profile binaries (upload)
info win_private_profile Affect private profile binaries (upload)
info win_registry Affect system registries binaries (upload)

Network (13cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://67.212.241.178/login.cgi?uri=/index.html US TWIN-LAKES 67.212.241.178 447 mailcious
https://67.212.241.178/cookiechecker?uri=/rob86/TEST22-PC_W617601.8737B6E31BA23B3C4DD9E983745731F0/5/file/ US TWIN-LAKES 67.212.241.178 447 mailcious
https://71.40.62.107/rob86/TEST22-PC_W617601.8737B6E31BA23B3C4DD9E983745731F0/5/file/ US TWC-11427-TEXAS 71.40.62.107 clean
https://67.212.241.178/index.html US TWIN-LAKES 67.212.241.178 447 mailcious
67.212.241.178 US TWIN-LAKES 67.212.241.178 mailcious
71.40.62.107 US TWC-11427-TEXAS 71.40.62.107 clean
73.103.36.158 US COMCAST-7922 73.103.36.158 mailcious
71.66.92.190 US TWC-10796-MIDWEST 71.66.92.190 mailcious
50.197.243.125 US COMCAST-7922 50.197.243.125 mailcious
68.201.55.46 US TWC-11427-TEXAS 68.201.55.46 mailcious
70.119.149.64 US TWC-11427-TEXAS 70.119.149.64 mailcious
72.128.158.51 US TWC-11427-TEXAS 72.128.158.51 mailcious
71.42.188.85 US TWC-11427-TEXAS 71.42.188.85 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure