Report - .audiodg.exe

Malicious Library Admin Tool (Sysinternals etc ...) .NET framework(MSIL) PE File ftp .NET EXE PE32
ScreenShot
Created 2024.04.20 16:23 Machine s1_win7_x6401
Filename .audiodg.exe
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
AI Score
8
Behavior Score
2.0
ZERO API file : malware
VT API (file) 57 detected (m7QV, malicious, high confidence, score, YakbeexMSIL, LokiBot, unsafe, Loki, Save, Kryptik, Eldorado, Malcode, gdn30, PWSX, Agensla, ali2000016, MSIL@AI, MSIL2, hKZ5zch2f30MwNAXCWdRWw, AGEN, PackedNET, high, gzxyf, ai score=100, Malware@#16bax4t0bnjbg, AgentTesla, Detected, R434721, ZemsilF, m0@a8kZWji, GdSda, QQPass, QQRob, Mzfl, Static AI, Malicious PE, susgen, confidence, 100%)
md5 fc030e6077d1a645b2bb1e0d77cc778d
sha256 0293d5dfdc4a137166aebb05f2c1b7b4819846032b6c1cd6431f83b4f282cf88
ssdeep 12288:d/K2wx768UCS0MVy6//wgDk+5hKN9xXhTr5/dKoBoRoDoyoDc5v2jVQTigBxHZw/:fIcrHKBN5/dKK64JV5v2j4ccnGj
imphash f34d5f2d4577ed6d9ceec516c1f5a744
impfuzzy 3:rGsLdAIEK:tf
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 57 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system
info Checks if process is being debugged by a debugger

Rules (7cnts)

Level Name Description Collection
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Win32_Trojan_PWS_Net_1_Zero Win32 Trojan PWS .NET Azorult binaries (upload)
info ftp_command ftp command binaries (upload)
info Is_DotNET_EXE (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

mscoree.dll
 0x402000 _CorExeMain

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure