analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

FRD52114.js

Full analysis: https://app.any.run/tasks/58e9c3eb-e171-433a-9cdd-ba50d8b0e3d5
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: December 18, 2018, 12:07:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
revenge
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with no line terminators
MD5:

5EE91894AFD04880996766C20E0EFE18

SHA1:

7415D454CCBB1D3DE8BD10E22DA9B6A74EC247E9

SHA256:

39FA2753738AEA7E2CCF56747B76038F2AFA91976107DD8ED6192B455C33BF54

SSDEEP:

24576:Xoz1TiXItfFG7rnIdBjq8A1caEm6yMcol1Diq9ePus8mK/t30vrphcMSLYPHIGZM:w

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • jubv.exe (PID: 2540)
      • vvrt.exe (PID: 3932)
    • REVENGE was detected

      • jubv.exe (PID: 2540)
      • vvrt.exe (PID: 3932)
    • Connects to CnC server

      • jubv.exe (PID: 2540)
      • vvrt.exe (PID: 3932)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WScript.exe (PID: 3068)
      • jubv.exe (PID: 2540)
    • Connects to unusual port

      • jubv.exe (PID: 2540)
      • vvrt.exe (PID: 3932)
    • Starts itself from another location

      • jubv.exe (PID: 2540)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start wscript.exe #REVENGE jubv.exe #REVENGE vvrt.exe

Process information

PID
CMD
Path
Indicators
Parent process
3068"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\FRD52114.js"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2540"C:\Users\admin\AppData\Local\Temp\jubv.exe" C:\Users\admin\AppData\Local\Temp\jubv.exe
WScript.exe
User:
admin
Company:
Canneverbe Limited
Integrity Level:
MEDIUM
Description:
CDBurnerXP
Exit code:
0
Version:
4.5.8.7041
3932"C:\Users\admin\Documents\vvrt.exe" C:\Users\admin\Documents\vvrt.exe
jubv.exe
User:
admin
Company:
Canneverbe Limited
Integrity Level:
MEDIUM
Description:
CDBurnerXP
Version:
4.5.8.7041
Total events
796
Read events
788
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2540jubv.exeC:\Users\admin\Documents\vvrt.exeexecutable
MD5:22B6A57C25C5DDF4D6F4986CB23019EF
SHA256:AAE64CFBE56537C0C60243B61A88339AFF5044ADB2691255ECFFDD7B7F0FF39A
3068WScript.exeC:\Users\admin\AppData\Local\Temp\jubv.exeexecutable
MD5:22B6A57C25C5DDF4D6F4986CB23019EF
SHA256:AAE64CFBE56537C0C60243B61A88339AFF5044ADB2691255ECFFDD7B7F0FF39A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3932
vvrt.exe
207.180.235.201:85
River City Internet Group (Primary Networks)
US
malicious
2540
jubv.exe
207.180.235.201:85
River City Internet Group (Primary Networks)
US
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] MSIL/Maadawy-RAT (njRAT) CnC Response
2540
jubv.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge-RAT (Win32.Netsha.RAT) C2 response
15 ETPRO signatures available at the full report
No debug info