ScreenShot
Created 2021.03.30 07:42 Machine s1_win7_x6402
Filename g38ufhf.zip
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
1
Behavior Score
5.6
ZERO API file : malware
VT API (file) 13 detected (malicious, high confidence, Artemis, Unsafe, ZedlaF, xq4@a0d4b, Strealer, CLOUD, Wacapew, score, QVM40)
md5 bd4f52581f43477b31a387ed0b6a5684
sha256 78f9c1f6ae02832ac63c6697f6089cc903119a206e7388bb662f02985fee3127
ssdeep 6144:0bazNBbycfmKsyUlV6MdUFIk1KyHNwoAtpFp5xM6C1h:fzeTlV6/7HN+p5W6Uh
imphash 10b339eba7ed6a12d0c67a18515a94ff
impfuzzy 48:catMS17Mbc+ppXm30AEQbJMeEUn6gF09/ZXUYsI:rtMS17Mbc+ppXq8XjsI
  Network IP location

Signature (15cnts)

Level Description
watch A process performed obfuscation on information about the computer or sent it to a remote location indicative of CnC Traffic/Preperations.
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch File has been identified by 13 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Sends data using the HTTP POST Method
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info One or more processes crashed
info Queries for the computername
info This executable has a PDB path
info Tries to locate where the browsers are installed

Rules (8cnts)

Level Name Description Collection
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check Signature Zero binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasDebugData DebugData Check binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)
info win_files_operation Affect private profile binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://210.65.244.176/ TW Data Communication Business Group 210.65.244.176 mailcious
210.65.244.176 TW Data Communication Business Group 210.65.244.176 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure