analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.gz

Full analysis: https://app.any.run/tasks/d4c0339d-01ec-42e7-a66f-ea508018d216
Verdict: Malicious activity
Analysis date: May 15, 2019, 14:56:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
Indicators:
MIME: application/gzip
File info: gzip compressed data, max compression, from Unix
MD5:

8E2B3DB0C9E3B725EFA45AF9AF20379F

SHA1:

258B9FFE503B08DEA703D21AE600BDAF60BC480E

SHA256:

0421B90D58D8D47B5FB3656449351BBEA58AA56FA7CB87B5933FF0E5AA295978

SSDEEP:

24576:acN7yi/XDAjx+voqrouFuJtP7y62JoRGZ5QsfMXo7VPHma0v9gwpbKpppn:a2OiroqrouFYtP7y6OoS5dWop/GVbUTn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe (PID: 2520)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3572)
      • 0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe (PID: 2520)
    • Changes the autorun value in the registry

      • 0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe (PID: 2520)
    • Adds new firewall rule via NETSH.EXE

      • 0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe (PID: 2520)
  • SUSPICIOUS

    • Reads Environment values

      • 0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe (PID: 2520)
    • Uses NETSH.EXE for network configuration

      • 0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe (PID: 2520)
    • Creates files in the program directory

      • 0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe (PID: 2520)
    • Checks for external IP

      • 0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe (PID: 2520)
    • Changes tracing settings of the file or console

      • 0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe (PID: 2520)
    • Executable content was dropped or overwritten

      • 0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe (PID: 2520)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.z/gz/gzip | GZipped data (100)

EXIF

ZIP

OperatingSystem: Unix
ExtraFlags: Maximum Compression
ModifyDate: 0000:00:00 00:00:00
Flags: (none)
Compression: Deflated
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs 0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe searchprotocolhost.exe no specs netsh.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2964"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.gz"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2520"C:\Users\admin\Desktop\0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe" C:\Users\admin\Desktop\0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
3572"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
3908"netsh.exe" advfirewall firewall add rule name="kraken.exe" profile=any enable=yes DIR=in program="C:\Users\admin\Desktop\0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe" Action=AllowC:\Windows\system32\netsh.exe0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
531
Read events
449
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2964WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2964.23095\0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin
MD5:
SHA256:
25200725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exeC:\Users\admin\Desktop\loader.dllexecutable
MD5:CF6A5B1C382C8325E9A21B6C71937DF7
SHA256:99668918590715AB34B9182144ABD54C2E42ECB85164E0AA9484940BB59882A4
25200725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exeC:\ProgramData\Isolated Storage\36A92875\90424E7Ebinary
MD5:BF565BDFC5DD1697D8D225BC9DBFFEC0
SHA256:01D8EB441C0B654A122F7A631555D752427E487D2307139E91B1F1E4E77DE93F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
120
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2520
0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe
GET
200
104.20.16.242:80
http://icanhazip.com/
US
text
12 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2520
0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe
139.162.217.110:33445
Linode, LLC
GB
unknown
2520
0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe
185.64.89.42:33445
mrflibble.c4.ee
Pulsant (Scotland) Ltd
GB
unknown
2520
0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe
108.61.165.198:33445
Choopa, LLC
NL
unknown
2520
0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe
104.20.16.242:80
icanhazip.com
Cloudflare Inc
US
shared
94.130.54.112:33445
tox.deadteam.org
Hetzner Online GmbH
DE
unknown
108.61.165.198:33445
Choopa, LLC
NL
unknown
138.94.71.250:33445
home.vikingmakt.com.br
Intervel Informatica Ltda
BR
unknown
83.137.53.211:1813
d4rk4.ru
SVS Communication
RU
unknown
2520
0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe
5.180.34.44:33445
biribiri.org
malicious
139.162.217.110:33445
Linode, LLC
GB
unknown

DNS requests

Domain
IP
Reputation
icanhazip.com
  • 104.20.16.242
  • 104.20.17.242
shared
mrflibble.c4.ee
  • 185.64.89.42
unknown
d4rk4.ru
  • 83.137.53.211
malicious
home.vikingmakt.com.br
  • 138.94.71.250
unknown
tox.deadteam.org
  • 94.130.54.112
unknown
biribiri.org
  • 5.180.34.44
malicious

Threats

PID
Process
Class
Message
2520
0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe
Attempted Information Leak
ET POLICY IP Check Domain (icanhazip. com in HTTP Host)
2520
0725b370325fc8144d5af7087cf6a97131e72f6b3dede2b42bb92290e9944a35.bin.exe
A Network Trojan was detected
MALWARE [PTsecurity] Kraken
No debug info