Edit tour
Windows
Analysis Report
iKhdG3bwZK.exe
Overview
General Information
Sample name: | iKhdG3bwZK.exerenamed because original name is a hash value |
Original sample name: | 1438fe084b1e9bb3574c99cc44a53e6e1bee6e76a20c9bf2bb62139a70ffa211.exe |
Analysis ID: | 1562117 |
MD5: | 044037796cf2d13eadf0217833d52e65 |
SHA1: | b2e117be2c836ad18d1edccdd440fe44587b1386 |
SHA256: | 1438fe084b1e9bb3574c99cc44a53e6e1bee6e76a20c9bf2bb62139a70ffa211 |
Tags: | exeTRADETRUSTLLCuser-JAMESWT_MHT |
Infos: | |
Detection
GO Backdoor
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GO Backdoor
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Found Tor onion address
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Msiexec Initiated Connection
Uses 32bit PE files
Classification
- System is w10x64
- iKhdG3bwZK.exe (PID: 6576 cmdline:
"C:\Users\ user\Deskt op\iKhdG3b wZK.exe" MD5: 044037796CF2D13EADF0217833D52E65) - more.com (PID: 6692 cmdline:
C:\Windows \SysWOW64\ more.com MD5: 03805AE7E8CBC07840108F5C80CF4973) - conhost.exe (PID: 6720 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msiexec.exe (PID: 6620 cmdline:
C:\Windows \SysWOW64\ msiexec.ex e MD5: 9D09DC1EDA745A5F87553048E57620CF)
- LogiAiPrompt.exe (PID: 2208 cmdline:
"C:\Users\ user\AppDa ta\Roaming \docker\Lo giAiPrompt .exe" MD5: 044037796CF2D13EADF0217833D52E65)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GOBackdoor | Yara detected GO Backdoor | Joe Security | ||
JoeSecurity_GOBackdoor | Yara detected GO Backdoor | Joe Security | ||
JoeSecurity_GOBackdoor | Yara detected GO Backdoor | Joe Security | ||
JoeSecurity_GOBackdoor | Yara detected GO Backdoor | Joe Security |
Source: | Author: frack113: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T08:32:51.454857+0100 | 2855478 | 1 | A Network Trojan was detected | 192.168.2.4 | 49745 | 46.8.232.106 | 30001 | TCP |
2024-11-25T08:32:53.161229+0100 | 2855478 | 1 | A Network Trojan was detected | 192.168.2.4 | 49746 | 46.8.236.61 | 30001 | TCP |
2024-11-25T08:32:54.707596+0100 | 2855478 | 1 | A Network Trojan was detected | 192.168.2.4 | 49747 | 91.212.166.91 | 30001 | TCP |
2024-11-25T08:32:56.462874+0100 | 2855478 | 1 | A Network Trojan was detected | 192.168.2.4 | 49749 | 188.130.206.243 | 30001 | TCP |
2024-11-25T08:32:58.717750+0100 | 2855478 | 1 | A Network Trojan was detected | 192.168.2.4 | 49750 | 38.180.205.164 | 30001 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T08:33:00.211852+0100 | 2855536 | 1 | A Network Trojan was detected | 192.168.2.4 | 49751 | 109.172.88.38 | 14206 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T08:33:28.896467+0100 | 2855537 | 1 | A Network Trojan was detected | 192.168.2.4 | 49751 | 109.172.88.38 | 14206 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T08:33:29.364597+0100 | 2855538 | 1 | A Network Trojan was detected | 109.172.88.38 | 14206 | 192.168.2.4 | 49751 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T08:33:00.211444+0100 | 2855539 | 1 | A Network Trojan was detected | 109.172.88.38 | 14206 | 192.168.2.4 | 49751 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | String found in binary or memory: |