| File name: | SMTP Cracker V3.2.exe |
| Full analysis: | https://app.any.run/tasks/5464ffea-34b8-4795-8527-915f2dc76a17 |
| Verdict: | Malicious activity |
| Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
| Analysis date: | February 09, 2024, 22:28:44 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | 7B7E33919ABAAC7C2230A24F5175B61A |
| SHA1: | 616A224925F0577ED900137CF0635D454B0D0C66 |
| SHA256: | 058593C2A0B2E3E38F420613659E72C86219F37F78A4C1F907DDF507257A70B1 |
| SSDEEP: | 98304:sLpheNx6zan2Gi49PGY96UCZwc7nftkti7DawJcwI8ymAFL1EEnIq5miA3AVrLfK:qELBRer6A |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2015:12:27 05:38:55+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 24576 |
| InitializedDataSize: | 164864 |
| UninitializedDataSize: | 1024 |
| EntryPoint: | 0x310d |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1776 | "C:\Users\admin\AppData\Local\Temp\rundll.exe" | C:\Users\admin\AppData\Local\Temp\rundll.exe | SMTP Cracker V3.2.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
NjRat(PID) Process(1776) rundll.exe C2anajit.hopto.org Ports1177 BotnetGroupe Options Auto-run registry keySoftware\Microsoft\Windows\CurrentVersion\Run\afc36350fc89b7b03a13fd5d08886385 Splitter|'|'| Version0.7d | |||||||||||||||
| 3668 | "C:\Users\admin\AppData\Local\Temp\SMTP Cracker V3.2.exe" | C:\Users\admin\AppData\Local\Temp\SMTP Cracker V3.2.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 3772 | "C:\Users\admin\AppData\Local\Temp\SMTP Cracker V3.2.exe" | C:\Users\admin\AppData\Local\Temp\SMTP Cracker V3.2.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3932 | netsh firewall add allowedprogram "C:\Users\admin\AppData\Local\Temp\rundll.exe" "rundll.exe" ENABLE | C:\Windows\System32\netsh.exe | — | rundll.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3772) SMTP Cracker V3.2.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3772) SMTP Cracker V3.2.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3772) SMTP Cracker V3.2.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3772) SMTP Cracker V3.2.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (1776) rundll.exe | Key: | HKEY_CURRENT_USER |
| Operation: | write | Name: | di |
Value: ! | |||
| (PID) Process: | (1776) rundll.exe | Key: | HKEY_CURRENT_USER\Environment |
| Operation: | write | Name: | SEE_MASK_NOZONECHECKS |
Value: 1 | |||
| (PID) Process: | (3932) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3932) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-100 |
Value: DHCP Quarantine Enforcement Client | |||
| (PID) Process: | (3932) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-101 |
Value: Provides DHCP based enforcement for NAP | |||
| (PID) Process: | (3932) netsh.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\system32\dhcpqec.dll,-103 |
Value: 1.0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3772 | SMTP Cracker V3.2.exe | C:\Users\admin\AppData\Local\Temp\rundll.exe | executable | |
MD5:3173FFCF9D577267E409D9C98ACF866D | SHA256:2C51248F0C354DD3C3FFAB0AD684E612857475D8FBBE043C2E24BA0392F354AF | |||
| 1776 | rundll.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\afc36350fc89b7b03a13fd5d08886385.exe | executable | |
MD5:3173FFCF9D577267E409D9C98ACF866D | SHA256:2C51248F0C354DD3C3FFAB0AD684E612857475D8FBBE043C2E24BA0392F354AF | |||
| 3772 | SMTP Cracker V3.2.exe | C:\Users\admin\AppData\Local\Temp\SMTP Cracker V4.exe | executable | |
MD5:81AABCC46CE7B6F11BB603020AA0B6A6 | SHA256:3B9F4A6C4C47AC8B8DE82C05F2506AF223F873BAFAF8EB5F07C7F9E99634626A | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1776 | rundll.exe | 41.142.26.106:1177 | anajit.hopto.org | MT-MPLS | MA | unknown |
Domain | IP | Reputation |
|---|---|---|
anajit.hopto.org |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.hopto .org |
1776 | rundll.exe | Malware Command and Control Activity Detected | ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) |