File name: | FPcryack.rar |
Full analysis: | https://app.any.run/tasks/181c541d-63d1-484d-aec0-9858b661b279 |
Verdict: | Malicious activity |
Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
Analysis date: | May 20, 2019, 13:03:48 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-rar |
File info: | RAR archive data, v5 |
MD5: | 53661966614F18870902B7D39E63FDA2 |
SHA1: | F2332E27A478C46BEA5C15F1C22AC7F04A287E71 |
SHA256: | 2E6CAD9B5455F3A3FF3B9D5B39BC91C0386888BD7640C676BE157520D29A0FE3 |
SSDEEP: | 3072:Pl6uZ7VMIIiL1TdmgC5HOBbLM4TAqzfC58:Pl6uZ7ciRd3c8I7qW58 |
.rar | | | RAR compressed archive (v5.0) (61.5) |
---|---|---|
.rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2940 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\FPcryack.rar" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 | ||||
3396 | "C:\Users\admin\Desktop\FPcryack.exe" | C:\Users\admin\Desktop\FPcryack.exe | — | explorer.exe |
User: admin Integrity Level: MEDIUM Exit code: 3221225547 Version: 1.00 | ||||
3036 | "C:\Users\admin\Desktop\FPcryack.EXE" | C:\Users\admin\Desktop\FPcryack.EXE | FPcryack.exe | |
User: admin Integrity Level: MEDIUM Exit code: 3221225547 Version: 1.00 | ||||
3232 | "C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "FPcryack.EXE" | C:\Windows\system32\cmd.exe | — | FPcryack.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3700 | C:\Windows\system32\timeout.exe 3 | C:\Windows\system32\timeout.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
(PID) Process: | (2940) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtBMP |
Value: | |||
(PID) Process: | (2940) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtIcon |
Value: | |||
(PID) Process: | (2940) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (2940) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\FPcryack.rar | |||
(PID) Process: | (2940) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (2940) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (2940) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (2940) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (2940) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin |
Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000 | |||
(PID) Process: | (2940) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\General |
Operation: | write | Name: | LastFolder |
Value: C:\Users\admin\AppData\Local\Temp |
PID | Process | Filename | Type | |
---|---|---|---|---|
2940 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2940.45614\FPcryack.exe | executable | |
MD5:323A2596AEDE485B027F19C4EE82CAC5 | SHA256:30C6D8B5A8FAF91E739E9E75915094954BF5DED6115887A4CB9647DEFE1DE7CC | |||
3036 | FPcryack.EXE | C:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-datetime-l1-1-0.dll | executable | |
MD5:CB978304B79EF53962408C611DFB20F5 | SHA256:90FAE0E7C3644A6754833C42B0AC39B6F23859F9A7CF4B6C8624820F59B9DAD3 | |||
3036 | FPcryack.EXE | C:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-debug-l1-1-0.dll | executable | |
MD5:88FF191FD8648099592ED28EE6C442A5 | SHA256:C310CC91464C9431AB0902A561AF947FA5C973925FF70482D3DE017ED3F73B7D | |||
3036 | FPcryack.EXE | C:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-processthreads-l1-1-0.dll | executable | |
MD5:A2D7D7711F9C0E3E065B2929FF342666 | SHA256:9DAB884071B1F7D7A167F9BEC94BA2BEE875E3365603FA29B31DE286C6A97A1D | |||
3036 | FPcryack.EXE | C:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-file-l2-1-0.dll | executable | |
MD5:E479444BDD4AE4577FD32314A68F5D28 | SHA256:C85DC081B1964B77D289AAC43CC64746E7B141D036F248A731601EB98F827719 | |||
3036 | FPcryack.EXE | C:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-file-l1-1-0.dll | executable | |
MD5:94AE25C7A5497CA0BE6882A00644CA64 | SHA256:7EA06B7050F9EA2BCC12AF34374BDF1173646D4E5EBF66AD690B37F4DF5F3D4E | |||
3036 | FPcryack.EXE | C:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-console-l1-1-0.dll | executable | |
MD5:502263C56F931DF8440D7FD2FA7B7C00 | SHA256:94A5DF1227818EDBFD0D5091C6A48F86B4117C38550343F780C604EEE1CD6231 | |||
3036 | FPcryack.EXE | C:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-localization-l1-2-0.dll | executable | |
MD5:EFF11130BFE0D9C90C0026BF2FB219AE | SHA256:03AD57C24FF2CF895B5F533F0ECBD10266FD8634C6B9053CC9CB33B814AD5D97 | |||
3036 | FPcryack.EXE | C:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-errorhandling-l1-1-0.dll | executable | |
MD5:6D778E83F74A4C7FE4C077DC279F6867 | SHA256:A97DCCA76CDB12E985DFF71040815F28508C655AB2B073512E386DD63F4DA325 | |||
3036 | FPcryack.EXE | C:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-handle-l1-1-0.dll | executable | |
MD5:6DB54065B33861967B491DD1C8FD8595 | SHA256:945CC64EE04B1964C1F9FCDC3124DD83973D332F5CFB696CDF128CA5C4CBD0E5 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3036 | FPcryack.EXE | POST | 200 | 77.222.40.236:80 | http://loginbssdr.temp.swtest.ru/index.php | RU | text | 2 b | malicious |
3036 | FPcryack.EXE | POST | 200 | 77.222.40.236:80 | http://loginbssdr.temp.swtest.ru/index.php | RU | binary | 4.27 Mb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3036 | FPcryack.EXE | 77.222.40.236:80 | loginbssdr.temp.swtest.ru | SpaceWeb Ltd | RU | malicious |
Domain | IP | Reputation |
---|---|---|
loginbssdr.temp.swtest.ru |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
3036 | FPcryack.EXE | A Network Trojan was detected | MALWARE [PTsecurity] AZORult.Stealer HTTP Header |
3036 | FPcryack.EXE | A Network Trojan was detected | MALWARE [PTsecurity] AZORult Request |
3036 | FPcryack.EXE | A Network Trojan was detected | MALWARE [PTsecurity] AZORult Response |
3036 | FPcryack.EXE | A Network Trojan was detected | MALWARE [PTsecurity] AZORult.Stealer HTTP Header |
3036 | FPcryack.EXE | A Network Trojan was detected | ET TROJAN Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative) |