Report - file.exe

Glupteba
ScreenShot
Created 2021.03.30 11:02 Machine s1_win7_x6401
Filename file.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.6
ZERO API file : malware
VT API (file) 29 detected (AIDetect, malware2, malicious, high confidence, Unsafe, Save, Attribute, HighConfidence, score, FileRepMetagen, R + Mal, GandCrypt, Static AI, Malicious PE, Glupteba, ZexaF, NqW@aKVOM2hG, ET#89%, RDMK, cmRtazpzbA+F+ywlbfDWS9h8iobu, UrSnif, susgen, confidence, 100%)
md5 8254c45e7966fc7b7982430653a7caa9
sha256 eccb488915dd33f90f2279fef36bc1967dea81417bfdfcc919a8b5804bf503ef
ssdeep 12288:V5e1cDg1yrufApmbnPxCp+LFPEkgmJn5VQXUqzXTHVtTiCKRe:VQKuCmTJCg1Vd3QX7zXTHVdi3
imphash eda3d9c2270ed983c5462ed934ab1d52
impfuzzy 48:X9j5OYc+HKZPp40O7dcdx+cXtTI1KChZcFZFE:XyIox40+qx+cXtTI1HhZcfa
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 29 AntiVirus engines on VirusTotal as malicious
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info This executable has a PDB path

Rules (9cnts)

Level Name Description Collection
danger Trojan_Win32_Glupteba_1_Zero Trojan Win32 Glupteba binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasDebugData DebugData Check binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info IsPacked Entropy Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)
info win_files_operation Affect private profile binaries (upload)
info win_mutex Create or check mutex binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x493008 lstrlenA
 0x49300c CommConfigDialogA
 0x493010 GetCPInfo
 0x493014 GetQueuedCompletionStatus
 0x493018 AddConsoleAliasW
 0x49301c GetComputerNameW
 0x493020 CallNamedPipeW
 0x493024 GetModuleHandleW
 0x493028 SetCommState
 0x49302c SetProcessPriorityBoost
 0x493030 GlobalAlloc
 0x493034 _hread
 0x493038 GetVersionExW
 0x49303c HeapValidate
 0x493040 GetBinaryTypeA
 0x493044 ReadFile
 0x493048 lstrcatA
 0x49304c GetACP
 0x493050 RaiseException
 0x493054 GetNamedPipeHandleStateW
 0x493058 GetLargestConsoleWindowSize
 0x49305c GetLastError
 0x493060 SetDefaultCommConfigA
 0x493064 GetProcAddress
 0x493068 VirtualAlloc
 0x49306c BeginUpdateResourceW
 0x493070 CopyFileA
 0x493074 SetStdHandle
 0x493078 EnterCriticalSection
 0x49307c BuildCommDCBAndTimeoutsW
 0x493080 SetConsoleOutputCP
 0x493084 SetCommMask
 0x493088 SetEnvironmentVariableA
 0x49308c DebugSetProcessKillOnExit
 0x493090 LoadLibraryExA
 0x493094 CreateMutexA
 0x493098 EnumDateFormatsW
 0x49309c WriteConsoleOutputAttribute
 0x4930a0 DuplicateHandle
 0x4930a4 LocalSize
 0x4930a8 DeleteFileW
 0x4930ac TlsFree
 0x4930b0 CloseHandle
 0x4930b4 GetCurrentDirectoryW
 0x4930b8 GetCommandLineW
 0x4930bc WideCharToMultiByte
 0x4930c0 InterlockedIncrement
 0x4930c4 InterlockedDecrement
 0x4930c8 InterlockedCompareExchange
 0x4930cc InterlockedExchange
 0x4930d0 MultiByteToWideChar
 0x4930d4 Sleep
 0x4930d8 InitializeCriticalSection
 0x4930dc DeleteCriticalSection
 0x4930e0 LeaveCriticalSection
 0x4930e4 MoveFileA
 0x4930e8 HeapFree
 0x4930ec TerminateProcess
 0x4930f0 GetCurrentProcess
 0x4930f4 UnhandledExceptionFilter
 0x4930f8 SetUnhandledExceptionFilter
 0x4930fc IsDebuggerPresent
 0x493100 HeapReAlloc
 0x493104 HeapAlloc
 0x493108 ExitProcess
 0x49310c GetStartupInfoW
 0x493110 RtlUnwind
 0x493114 LCMapStringW
 0x493118 LCMapStringA
 0x49311c GetStringTypeW
 0x493120 SetHandleCount
 0x493124 GetStdHandle
 0x493128 GetFileType
 0x49312c GetStartupInfoA
 0x493130 WriteFile
 0x493134 GetConsoleCP
 0x493138 GetConsoleMode
 0x49313c HeapCreate
 0x493140 VirtualFree
 0x493144 TlsGetValue
 0x493148 TlsAlloc
 0x49314c TlsSetValue
 0x493150 SetLastError
 0x493154 GetCurrentThreadId
 0x493158 GetModuleFileNameA
 0x49315c LoadLibraryA
 0x493160 InitializeCriticalSectionAndSpinCount
 0x493164 GetModuleFileNameW
 0x493168 FreeEnvironmentStringsW
 0x49316c GetEnvironmentStringsW
 0x493170 QueryPerformanceCounter
 0x493174 GetTickCount
 0x493178 GetCurrentProcessId
 0x49317c GetSystemTimeAsFileTime
 0x493180 GetStringTypeA
 0x493184 HeapSize
 0x493188 GetOEMCP
 0x49318c IsValidCodePage
 0x493190 GetUserDefaultLCID
 0x493194 GetLocaleInfoA
 0x493198 EnumSystemLocalesA
 0x49319c IsValidLocale
 0x4931a0 WriteConsoleA
 0x4931a4 GetConsoleOutputCP
 0x4931a8 WriteConsoleW
 0x4931ac SetFilePointer
 0x4931b0 GetLocaleInfoW
 0x4931b4 FlushFileBuffers
 0x4931b8 CreateFileA
USER32.dll
 0x4931c0 GetAncestor
ADVAPI32.dll
 0x493000 IsTextUnicode

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure