analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Pornhub_Cracked.rar

Full analysis: https://app.any.run/tasks/718014db-9613-4e3f-9441-74e7e28d3c7b
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: December 06, 2018, 13:01:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
njrat
bladabindi
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

F71335174583BBA04C2906283D919555

SHA1:

592DAD0475BC1ADE209DAA2A8D7BEE9DC8589D14

SHA256:

3824303D78C8154A2D3B2417C008F9F850A49D3BDB842BFF3C929B4983A246DF

SSDEEP:

12288:fjYG8NcqSY4BQyCNtdodlLFTa3MjalPYVDool/9GH6uCYT3b1Uw9n:fkGdqSY4uyCRodZFTaLZc7x9OXCYL5b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Pornhub_Cracked.exe (PID: 1376)
      • svghost.exe (PID: 4080)
      • crypted.exe (PID: 2136)
      • Pornhub Cracked.exe (PID: 3956)
    • Writes to a start menu file

      • svghost.exe (PID: 4080)
    • NJRAT was detected

      • svghost.exe (PID: 4080)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Pornhub_Cracked.exe (PID: 1376)
      • crypted.exe (PID: 2136)
      • svghost.exe (PID: 4080)
    • Creates files in the user directory

      • Pornhub_Cracked.exe (PID: 1376)
      • svghost.exe (PID: 4080)
    • Starts itself from another location

      • crypted.exe (PID: 2136)
    • Creates files in the program directory

      • crypted.exe (PID: 2136)
    • Connects to unusual port

      • svghost.exe (PID: 4080)
  • INFO

    • Application was crashed

      • Pornhub Cracked.exe (PID: 3956)
    • Dropped object may contain Bitcoin addresses

      • Pornhub_Cracked.exe (PID: 1376)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start winrar.exe no specs pornhub_cracked.exe pornhub cracked.exe crypted.exe #NJRAT svghost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2948"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Pornhub_Cracked.rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1376"C:\Users\admin\Desktop\Pornhub_Cracked.exe" C:\Users\admin\Desktop\Pornhub_Cracked.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\pornhub_cracked.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3956"C:\Users\admin\AppData\Roaming\Pornhub Cracked.exe" C:\Users\admin\AppData\Roaming\Pornhub Cracked.exe
Pornhub_Cracked.exe
User:
admin
Company:
Azetej Company
Integrity Level:
HIGH
Description:
ViaGoGo Checker
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\pornhub cracked.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2136"C:\Users\admin\AppData\Roaming\crypted.exe" C:\Users\admin\AppData\Roaming\crypted.exe
Pornhub_Cracked.exe
User:
admin
Integrity Level:
HIGH
Description:
cat 70zx
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\crypted.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
4080"C:\ProgramData\svghost.exe" C:\ProgramData\svghost.exe
crypted.exe
User:
admin
Integrity Level:
HIGH
Description:
cat 70zx
Version:
1.0.0.0
Modules
Images
c:\programdata\svghost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
1 386
Read events
818
Write events
568
Delete events
0

Modification events

(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2948) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Pornhub_Cracked.rar
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2948) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1376) Pornhub_Cracked.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1376) Pornhub_Cracked.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
4
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2948WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2948.33504\Pornhub_Cracked.exe
MD5:
SHA256:
1376Pornhub_Cracked.exeC:\Users\admin\AppData\Roaming\Pornhub Cracked.exeexecutable
MD5:FEAC0E9C86DEFC843B19B04D9801195F
SHA256:CEBF75C534D06D21C72A7E534193A20B7A83EDD9AF9F98154C9E8F8A9D8801DE
1376Pornhub_Cracked.exeC:\Users\admin\AppData\Roaming\crypted.exeexecutable
MD5:6F02DC93DA6F1AC0487D90FEC5801553
SHA256:3E57EB72B3E0E61121C20C8945B70C98FF7100E63123226166E92263570127C9
4080svghost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\be1b22e51a35057733504927de28e62a.exeexecutable
MD5:6F02DC93DA6F1AC0487D90FEC5801553
SHA256:3E57EB72B3E0E61121C20C8945B70C98FF7100E63123226166E92263570127C9
2136crypted.exeC:\ProgramData\svghost.exeexecutable
MD5:6F02DC93DA6F1AC0487D90FEC5801553
SHA256:3E57EB72B3E0E61121C20C8945B70C98FF7100E63123226166E92263570127C9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
11
DNS requests
6
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4080
svghost.exe
197.0.5.209:5552
atacker007.ddns.net
TOPNET
TN
unknown

DNS requests

Domain
IP
Reputation
atacker007.ddns.net
  • 197.0.5.209
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info