Report - 6f7d96fd3ac7fc14ea874d7fdfcda1d5

North Korea Generic Malware Malicious Library PE File .NET EXE PE32
ScreenShot
Created 2024.10.15 14:32 Machine s1_win7_x6403
Filename 6f7d96fd3ac7fc14ea874d7fdfcda1d5
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
AI Score
7
Behavior Score
4.8
ZERO API file : malware
VT API (file) 45 detected (AIDetectMalware, AsyncRAT, jalapeno, Unsafe, malicious, confidence, 100%, Attribute, HighConfidence, high confidence, Bulz, kmnnyb, MSIL@AI, MSIL2, Yqpb9Xjf4ICnjU, KiNAqng, DownLoader46, XWORM, YXEFLZ, high, score, Static AI, Malicious PE, gjqe, Dotdo, Q@6jqch4, RDSD, Detected, Gencirc, AU+g6ApdqYY, susgen, GenKryptik, EXAT, GdSda, 3DGW)
md5 a71aaa9e10f9dc8701c208df3832a3b8
sha256 7761d76284feb79783d96c62b2088d14b39d9f5b485b429f2c0f69d081201629
ssdeep 6144:HAlG9hpBZvPIqkwawp2H24qBszT98CUgR8/PTSk+c8:gChpBZvPItGK2L2hSDD
imphash f34d5f2d4577ed6d9ceec516c1f5a744
impfuzzy 3:rGsLdAIEK:tf
  Network IP location

Signature (13cnts)

Level Description
danger File has been identified by 45 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info Queries for the computername
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
danger NorthKorea_Zero Maybe it's North Korea File binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info Is_DotNET_EXE (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://drive.usercontent.google.com/download?id=1XEWUwFdhz83ez1WgfQ4Lj72TbJhKq3zU&export=download US GOOGLE 142.250.71.193 clean
drive.usercontent.google.com US GOOGLE 142.250.206.193 mailcious
142.250.71.193 US GOOGLE 142.250.71.193 clean

Suricata ids

PE API

IAT(Import Address Table) Library

mscoree.dll
 0x440bc0 _CorExeMain

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure