Edit tour
Windows
Analysis Report
Week11.exe.bin.exe
Overview
General Information
Detection
GO Backdoor
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GO Backdoor
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to infect the boot sector
Found Tor onion address
AV process strings found (often used to terminate AV products)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- Week11.exe.bin.exe (PID: 7116 cmdline:
"C:\Users\ user\Deskt op\Week11. exe.bin.ex e" MD5: 4FBC4F26E90324C3B535943452460761)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GOBackdoor | Yara detected GO Backdoor | Joe Security |
⊘No Sigma rule has matched
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-10T16:48:27.568206+0100 | 2022930 | 1 | A Network Trojan was detected | 52.149.20.212 | 443 | 192.168.2.7 | 49740 | TCP |
2024-11-10T16:49:06.205644+0100 | 2022930 | 1 | A Network Trojan was detected | 52.149.20.212 | 443 | 192.168.2.7 | 49966 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-10T16:48:51.808327+0100 | 2855536 | 1 | A Network Trojan was detected | 192.168.2.7 | 49893 | 185.157.213.253 | 12072 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-10T16:49:21.106238+0100 | 2855537 | 1 | A Network Trojan was detected | 192.168.2.7 | 49893 | 185.157.213.253 | 12072 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-10T16:49:21.344322+0100 | 2855538 | 1 | A Network Trojan was detected | 185.157.213.253 | 12072 | 192.168.2.7 | 49893 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-10T16:48:51.808061+0100 | 2855539 | 1 | A Network Trojan was detected | 185.157.213.253 | 12072 | 192.168.2.7 | 49893 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Code function: | 1_2_0046C990 | |
Source: | Code function: | 1_2_0046D300 | |
Source: | Code function: | 1_2_004479B0 | |
Source: | Code function: | 1_2_00449B60 |
Source: | Code function: | 1_2_0046DE90 |
Source: | Code function: | 1_2_031C84C0 | |
Source: | Code function: | 1_2_031BD130 | |
Source: | Code function: | 1_2_031C7A50 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | String found in binary or memory: |