| File name: | XDFC.gz |
| Full analysis: | https://app.any.run/tasks/0eca3a64-7a0d-49e1-86c8-766e68bbb23b |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | April 22, 2024, 10:47:03 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 6130A8D84CD869CF916B20A8BC411716 |
| SHA1: | 7A8461C813D054995C50AA2D5139A9EF4341C8DB |
| SHA256: | 27866058AEF6D843E79DC8B301272AE2C9F76CBBD5EB32F993CEF74DA418BD60 |
| SSDEEP: | 98304:r1GsT9NwLA8uVr01BHtgyc3E8PvuhBQCVvWeArSzJk1p+NkSQHNh/5qxK/PWsQ+1:rpJCy |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1072 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\XDFC.gz.rar | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 2360 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa1072.16678\roDdeqsha.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa1072.16678\roDdeqsha.exe | roDdeqsha.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: roDdeqsha Version: 1.0.0.0 Modules
AgentTesla(PID) Process(2360) roDdeqsha.exe Protocolsmtp Hostmail.gencoldfire.com Port587 Usernameroycoo@gencoldfire.com PasswordU+&%W@y1mSEUOinP | |||||||||||||||
| 2812 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa1072.16678\roDdeqsha.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa1072.16678\roDdeqsha.exe | — | WinRAR.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: roDdeqsha Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| (PID) Process: | (1072) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (1072) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (1072) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1072) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (1072) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (1072) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (1072) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\XDFC.gz.rar | |||
| (PID) Process: | (1072) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (1072) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (1072) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1072 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa1072.16678\roDdeqsha.exe | executable | |
MD5:F319406EF27E59AD03A9772A888A0EF9 | SHA256:280477DBC907FFBA1A294CCD7A2B8B72A4DDC660956BE96C893BD2353D2B7ABA | |||
| 1072 | WinRAR.exe | C:\Users\admin\Desktop\roDdeqsha.exe | executable | |
MD5:F319406EF27E59AD03A9772A888A0EF9 | SHA256:280477DBC907FFBA1A294CCD7A2B8B72A4DDC660956BE96C893BD2353D2B7ABA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2360 | roDdeqsha.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | US | text | 6 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2360 | roDdeqsha.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | unknown |
2360 | roDdeqsha.exe | 185.196.11.12:587 | mail.gencoldfire.com | Simple Carrier LLC | US | unknown |
Domain | IP | Reputation |
|---|---|---|
ip-api.com |
| shared |
mail.gencoldfire.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ip-api. com) |
— | — | Device Retrieving External IP Address Detected | POLICY [ANY.RUN] External Hosting Lookup by ip-api |
— | — | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-api.com |
2360 | roDdeqsha.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 32 |
— | — | Misc activity | INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO) |