analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

OpenBulet.1.2.1.2.zip

Full analysis: https://app.any.run/tasks/c537241b-3e7c-4858-b651-349a37e42c29
Verdict: Malicious activity
Analysis date: April 14, 2019, 19:49:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

36FF1D6BAA5CE63072CB4D6D0679AC0B

SHA1:

1179E45116B4575B5F78AD72B6CE5C7A269B4583

SHA256:

26303176A4CC7B5F487D495FF3DF540353047B701176A20921DAF3284EF4D266

SSDEEP:

393216:+4/3LKXuG8u258EnaHMsVGQOyMKV83HN+QJ9/XTxt:+4/3LKX+OEnaHMNQOplUe7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • OpenBullet.exe (PID: 2632)
    • Loads dropped or rewritten executable

      • OpenBullet.exe (PID: 2632)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2960)
    • Reads Environment values

      • OpenBullet.exe (PID: 2632)
  • INFO

    • Reads settings of System Certificates

      • OpenBullet.exe (PID: 2632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: OpenBulet 1.2.1.2/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2019:04:07 12:47:23
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe openbullet.exe

Process information

PID
CMD
Path
Indicators
Parent process
2960"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2632"C:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\OpenBullet.exe" C:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\OpenBullet.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
OpenBullet
Version:
1.2.1.0
Total events
527
Read events
470
Write events
0
Delete events
0

Modification events

No data
Executable files
34
Suspicious files
0
Text files
7
Unknown types
4

Dropped files

PID
Process
Filename
Type
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\Leaf.xNet.dllexecutable
MD5:3F303B19BFF2A4AD3AEFA94C1A897F34
SHA256:B762310FBDE4B23D9D353998AC8B11292F715659247674352B9411FAC412D246
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\Extreme.Net.dllexecutable
MD5:F647E9A36E0CD58F3F245C34A6953092
SHA256:53719C10AA023927BE99DB87B200239A8093C9250655076C54A655738011B5F9
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\ICSharpCode.AvalonEdit.dllexecutable
MD5:B4D5D46E50006E87B30E7D514E95173C
SHA256:058F38F33F3F99F904AB9588447A234346C859718404B4E8A523673ED19CDBE7
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\Microsoft.Dynamic.dllexecutable
MD5:ABA389A299BEB16CC04337EC76C8A965
SHA256:4F7425CB08CC9BCA6FCA4BFC08D22B6D9716C507F306F40AE7134B878D909A21
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\LiteDB.dllexecutable
MD5:25B242D00C6C32E1F437EB2064EA2E29
SHA256:E72ACDDF47586BC0999D598E3BD125A254BB6F4AE151C076993304F6E31FBBED
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\IronPython.SQLite.dllexecutable
MD5:B7EFBF654402C78226B8D69AD0011BBB
SHA256:5A6E2EDA86E863E155F67CEBEF095355B7EA7B1DCD97D87E4058F0A5AC60D798
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\IronPython.dllexecutable
MD5:9A39A51E6DCB22B80DB481FBFBCD7826
SHA256:61B809B97DC878F42E85EE2C5D8471853527754E4F53B17C0507334C57E19E04
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\RuriLib.dllexecutable
MD5:69A74D374AC33E1DFCD954F7F3CAA43D
SHA256:0F8B85AC5147999058944AE1BCF14F78381E4E968391129DE935DBDD3DCD6BEB
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\IronPython.Wpf.dllexecutable
MD5:F1E1A1058A95C27CC453F8559E4AB3ED
SHA256:4061499B5E66C9309352A660A457AC95C8FA98229A8BBCCC648DEB85F5FF7CC7
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\OpenBulet.1.2.1.2\bin\System.Net.Http.dllexecutable
MD5:E4B20ECEADD0A1D030B407B02B913EBF
SHA256:F48E85C97F8E473240DB925D00EE871BE9E2E7B684B313B911D5C2C14C47078A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2632
OpenBullet.exe
151.101.0.133:443
raw.githubusercontent.com
Fastly
US
malicious

DNS requests

Domain
IP
Reputation
raw.githubusercontent.com
  • 151.101.0.133
  • 151.101.64.133
  • 151.101.128.133
  • 151.101.192.133
shared

Threats

No threats detected
No debug info