analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

PlayerBot.rar

Full analysis: https://app.any.run/tasks/6efdd665-09ac-436c-bd05-5db1cc27e22e
Verdict: Malicious activity
Threats:

Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely.

Analysis date: July 11, 2019, 13:56:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
quasar
browserloot
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

7EAB6FA8846346FC2854602BAFE6DD68

SHA1:

98AD7A16BA11E8EE92D51895E8AB68C906C80B05

SHA256:

34606B57832BF6CD94DE8F1B2A9A7DD59A3F371A0B014A2E12FD8518DD47CC29

SSDEEP:

3072:EonKQjPF8gzYp5FCK3NA2JVTwamuYRZ8+D5/ulz:EonbPhz2Ff6O2tZ38+dy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Robot.exe (PID: 2332)
    • Connects to CnC server

      • Robot.exe (PID: 2332)
    • Actions looks like stealing of personal data

      • Robot.exe (PID: 2332)
    • QUASAR was detected

      • Robot.exe (PID: 2332)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2984)
    • Reads the cookies of Google Chrome

      • Robot.exe (PID: 2332)
    • Creates files in the user directory

      • notepad++.exe (PID: 2584)
    • Reads Environment values

      • Robot.exe (PID: 2332)
  • INFO

    • Manual execution by user

      • Robot.exe (PID: 2332)
      • notepad++.exe (PID: 2584)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe notepad++.exe gup.exe #QUASAR robot.exe

Process information

PID
CMD
Path
Indicators
Parent process
2984"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\PlayerBot.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2584"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\license.key" "C:\Users\admin\Desktop\Robot.exe" "C:\Users\admin\Desktop\cookies.txt"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.51
3804"C:\Program Files\Notepad++\updater\gup.exe" -v7.51C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
GUP : a free (LGPL) Generic Updater
Exit code:
0
Version:
4.1
2332"C:\Users\admin\Desktop\Robot.exe" C:\Users\admin\Desktop\Robot.exe
explorer.exe
User:
admin
Company:
Aris
Integrity Level:
MEDIUM
Description:
Robot
Exit code:
0
Version:
5.2.2.2
Total events
554
Read events
498
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.43791\cookies.txt
MD5:
SHA256:
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.43791\license.key
MD5:
SHA256:
2984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2984.43791\Robot.exeexecutable
MD5:A792C1B31B35803AAA1EB014CAB2DEEA
SHA256:5BFAC06D46E18C9CB79F248130A3507EF09CAC1FDEBC663392BECD2169591089
2332Robot.exeC:\Users\admin\AppData\Local\Temp\93b65675-46b1-45a0-96c5-e2a6d9161f2c_chrome.txttext
MD5:126B038DD8B3CE61F68C10DD057EB1C6
SHA256:60D720137756F3A2E52CE33503D0CD188AF86C3E371292AF75DDFE6699034869
2584notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\config.xmlxml
MD5:B7049FA893B23057DC9B16D5225E73A4
SHA256:BCDC0336FC9C5BCB3FFAE8FB9B790B5313F51394EA4FCF50FE47F440A3B8D888
2584notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\session.xmltext
MD5:EA9FE896B4305C2A9629FEB279084544
SHA256:EF99FB4EFE424FABB1F3CD0076CC532EF5767D6CD1D09611C4F69F1BE03702B6
2584notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\langs.xmlxml
MD5:E792264BEC29005B9044A435FBA185AB
SHA256:5298FD2F119C43D04F6CF831F379EC25B4156192278E40E458EC356F9B49D624
2584notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\plugins\Config\converter.initext
MD5:F70F579156C93B097E656CABA577A5C9
SHA256:B926498A19CA95DC28964B7336E5847107DD3C0F52C85195C135D9DD6CA402D4
2584notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\stylers.xmlxml
MD5:44982E1D48434C0AB3E8277E322DD1E4
SHA256:3E661D3F1FF3977B022A0ACC26B840B5E57D600BC03DCFC6BEFDB408C665904C
2584notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\shortcuts.xmltext
MD5:AD21A64014891793DD9B21D835278F36
SHA256:C24699C9D00ABDD510140FE1B2ACE97BFC70D8B21BF3462DED85AFC4F73FE52F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
4
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.21.242.187:80
http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D
NL
der
1.37 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3804
gup.exe
37.59.28.236:443
notepad-plus-plus.org
OVH SAS
FR
whitelisted
2332
Robot.exe
104.31.76.103:443
rokey.xyz
Cloudflare Inc
US
shared
2332
Robot.exe
104.31.77.103:443
rokey.xyz
Cloudflare Inc
US
shared
2.21.242.187:80
isrg.trustid.ocsp.identrust.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
notepad-plus-plus.org
  • 37.59.28.236
whitelisted
rokey.xyz
  • 104.31.77.103
  • 104.31.76.103
malicious
browserloot.rokey.xyz
  • 104.31.76.103
  • 104.31.77.103
malicious
isrg.trustid.ocsp.identrust.com
  • 2.21.242.187
  • 2.21.242.197
whitelisted

Threats

PID
Process
Class
Message
2332
Robot.exe
A Network Trojan was detected
MALWARE [PTsecurity] BrowserLoot Stealer
2332
Robot.exe
A Network Trojan was detected
MALWARE [PTsecurity] BrowserLoot Stealer
1 ETPRO signatures available at the full report
Process
Message
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
42C4C5846BB675C74E2B2C90C69AB44366401093