analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

flx7zh.rar

Full analysis: https://app.any.run/tasks/017c7342-aa41-4076-b525-ccda241fe04a
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 23, 2019, 03:31:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

09FDFEC5D7AB5B0D1B7BB1217CB75475

SHA1:

7A35701696A7B08A736B1F446B02A5C45BC28749

SHA256:

24DA9FE3364B1FB79818B781BAB9142E7BD55AF23A66E7361BC8FD9160C4AE60

SSDEEP:

196608:+TuKdz/qpK1ecBWr36pYZqK5dWsO6KLTkb4+uVFGLpHzKdF8vjxo3Vh2e/8A9:WTl/r1JxKSsO6KUUTsLpHzWF8do3b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • mako.exe (PID: 1860)
      • mako.exe (PID: 3108)
    • Loads dropped or rewritten executable

      • mako.exe (PID: 1860)
    • Stealing of credential data

      • mako.exe (PID: 1860)
    • Writes to a start menu file

      • mako.exe (PID: 1860)
    • Actions looks like stealing of personal data

      • mako.exe (PID: 1860)
  • SUSPICIOUS

    • Connects to unusual port

      • mako.exe (PID: 1860)
    • Executable content was dropped or overwritten

      • mako.exe (PID: 3108)
      • WinRAR.exe (PID: 3376)
      • mako.exe (PID: 1860)
    • Loads Python modules

      • mako.exe (PID: 1860)
    • Reads the cookies of Mozilla Firefox

      • mako.exe (PID: 1860)
    • Reads the cookies of Google Chrome

      • mako.exe (PID: 1860)
    • Creates files in the user directory

      • mako.exe (PID: 1860)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • mako.exe (PID: 3108)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winrar.exe mako.exe mako.exe wmic.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3376"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\flx7zh.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3108"C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.32679\mako.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.32679\mako.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
1860"C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.32679\mako.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3376.32679\mako.exe
mako.exe
User:
admin
Integrity Level:
MEDIUM
3472wmic csproduct get uuidC:\Windows\System32\Wbem\wmic.exemako.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
520
Read events
507
Write events
13
Delete events
0

Modification events

(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3376) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\flx7zh.rar
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3376) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
36
Suspicious files
1
Text files
17
Unknown types
4

Dropped files

PID
Process
Filename
Type
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\_cffi_backend.cp36-win32.pydexecutable
MD5:CE66B910E3E42F5AA1B8D943AA1F1A6E
SHA256:85D5389214ECBD128337CEA2AFF02C8497426260F843F5E3322C97A3856C4C20
3376WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3376.32679\mako.exeexecutable
MD5:FAC01B511B9C9F11466F2378A5CCBF27
SHA256:B2A2DBA373621A74D9390A66EFF540566EA746A3DA4B4EA9360D84FB533A53E5
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\_elementtree.pydexecutable
MD5:D60A85BB884B92C3C0A7C94F99EAF86A
SHA256:0A55204C6573E77A5DEBCDBCC6E9C1364E4C728591F640B632FD150144DFF965
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\_decimal.pydexecutable
MD5:B359F1139C6D235CD6A8C3F12FA803C0
SHA256:58BCBFD0CEFB905B1DDD67248DE01810ABA7DF81ECC731F7DC5F01C6699DBB2C
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\cryptography\hazmat\bindings\_constant_time.cp36-win32.pydexecutable
MD5:E1D9E23BD1D0AD315E6654FFECCF7761
SHA256:70F08277A69B3DBAA4487D5C512EE2D18EE395659F9825707B9E09D8A2A9AB0F
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\PIL\_imagingtk.cp36-win32.pydexecutable
MD5:D6B715222463FDD8559BD3B24F7F9084
SHA256:28AF2328B2E7E5142805736E7EBEC3D932574E49865031D6DA32F74CADA96D36
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\_win32sysloader.pydexecutable
MD5:F9FFF92FBDB383296C04D9BFFF0308C5
SHA256:B513F5423485E7F98DA5C733EA24BA5E3579BD5808912068CAA981A51F3C9A77
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\PIL\_webp.cp36-win32.pydexecutable
MD5:041FDBABD21734C1F3A06932A7313934
SHA256:7B4BF5E17B0B2D6DF9CA4D2831FBFF5460C5985EB99A003FAAC03BE382E0A607
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\PIL\_imaging.cp36-win32.pydexecutable
MD5:B5E08664BA82FE88EE796FA353790D49
SHA256:1C484AB72B7E39D58808568178FFB14595F0868D68E80089FF5379C546BA029B
3108mako.exeC:\Users\admin\AppData\Local\Temp\_MEI31082\cryptography\hazmat\bindings\_openssl.cp36-win32.pydexecutable
MD5:143E9BFDA67B92ED2B6AABCC76A226F6
SHA256:FE3EF3516C2C88C4E3A84037EFA155B621396C5A4BA6A861577128355BB6158D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
24
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1860
mako.exe
CONNECT
199.21.98.8:80
http://199.21.98.8:80api.telegram.org:443
US
unknown
1860
mako.exe
CONNECT
41.216.148.140:32372
http://41.216.148.140:32372api.telegram.org:443
BF
unknown
1860
mako.exe
CONNECT
109.172.160.93:53281
http://109.172.160.93:53281core.telegram.org:443
GE
unknown
1860
mako.exe
CONNECT
191.187.33.49:8080
http://191.187.33.49:8080api.telegram.org:443
BR
unknown
1860
mako.exe
CONNECT
109.172.160.93:53281
http://109.172.160.93:53281api.telegram.org:443
GE
unknown
1860
mako.exe
CONNECT
109.172.160.93:53281
http://109.172.160.93:53281api.telegram.org:443
GE
unknown
1860
mako.exe
CONNECT
109.172.160.93:53281
http://109.172.160.93:53281api.telegram.org:443
GE
unknown
1860
mako.exe
CONNECT
109.172.160.93:53281
http://109.172.160.93:53281api.telegram.org:443
GE
unknown
1860
mako.exe
CONNECT
138.185.156.174:4145
http://138.185.156.174:4145api.telegram.org:443
BR
unknown
1860
mako.exe
CONNECT
109.172.160.93:53281
http://109.172.160.93:53281api.telegram.org:443
GE
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1860
mako.exe
109.172.160.93:53281
Magticom Ltd.
GE
unknown
1860
mako.exe
190.248.17.30:48794
EPM Telecomunicaciones S.A. E.S.P.
CO
unknown
1860
mako.exe
191.187.33.49:8080
CLARO S.A.
BR
unknown
1860
mako.exe
79.98.145.42:80
ip.42.pl
Nitronet Sp. z o.o.
PL
suspicious
1860
mako.exe
103.12.20.25:9000
PT. Bens Data Solusi
ID
unknown
1860
mako.exe
199.21.98.8:80
YANDEX LLC
US
unknown
1860
mako.exe
88.99.195.6:443
api.getproxylist.com
Hetzner Online GmbH
DE
unknown
1860
mako.exe
41.216.148.140:32372
IPP-burkina-as
BF
unknown
1860
mako.exe
138.185.156.174:4145
UPNET PROVEDOR DE ACESSO E TELECOM
BR
unknown
1860
mako.exe
83.238.39.241:58431
Netia SA
PL
unknown

DNS requests

Domain
IP
Reputation
ip.42.pl
  • 79.98.145.42
suspicious
api.getproxylist.com
  • 88.99.195.6
unknown

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
No debug info