analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

a201dfd1858dd7beb422165ff251381b

Full analysis: https://app.any.run/tasks/8e7519ad-ae8f-48ce-a882-9bee019c415f
Verdict: Malicious activity
Analysis date: July 18, 2019, 14:42:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
latentbot
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

A201DFD1858DD7BEB422165FF251381B

SHA1:

5C5533B5B4743A44CB28E2BC2D9A8352C75C4A5D

SHA256:

459BB35B47D71971FD34877C6DDF00BE5A6CCD343856AE57098B5F67B7660EC3

SSDEEP:

49152:xl5RG4uLduaZPSslCN7crGdDsFgiHHROTAXU:xlTGVk7crIwFZX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LATENTBOT was detected

      • a201dfd1858dd7beb422165ff251381b.exe (PID: 3208)
    • Connects to CnC server

      • a201dfd1858dd7beb422165ff251381b.exe (PID: 3208)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (67.7)
.exe | Win32 EXE PECompact compressed (generic) (25.6)
.exe | Win32 Executable (generic) (2.7)
.exe | Win16/32 Executable Delphi generic (1.2)
.exe | Generic Win/DOS Executable (1.2)

EXIF

EXE

ProductVersion: 7.24.0.104
FileVersion: 59.0.0.0
FileDescription: koglpwed Serviços do Windows
CharacterSet: Windows, Latin1
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 7.24.0.104
FileVersionNumber: 59.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 5
ImageVersion: -
OSVersion: 5
EntryPoint: 0x2b7c78
UninitializedDataSize: -
InitializedDataSize: 556544
CodeSize: 2846720
LinkerVersion: 2.25
PEType: PE32
TimeStamp: 2019:07:15 05:14:22+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 15-Jul-2019 03:14:22
Detected languages:
  • English - United States
  • German - Germany
  • Portuguese - Brazil
FileDescription: koglpwed Serviços do Windows
FileVersion: 59.0.0.0
ProductVersion: 7.24.0.104

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0050
Pages in file: 0x0002
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x000F
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x001A
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 10
Time date stamp: 15-Jul-2019 03:14:22
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_BYTES_REVERSED_HI
  • IMAGE_FILE_BYTES_REVERSED_LO
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x002B4B8C
0x002B4C00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.35036
.itext
0x002B6000
0x00002220
0x00002400
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.08773
.data
0x002B9000
0x0000B318
0x0000B400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.96419
.bss
0x002C5000
0x00005ADC
0x00000000
IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.idata
0x002CB000
0x0000430A
0x00004400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.23088
.didata
0x002D0000
0x0000088A
0x00000A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.74949
.tls
0x002D1000
0x00000040
0x00000000
IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rdata
0x002D2000
0x00000018
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0.205446
.reloc
0x002D3000
0x00034760
0x00034800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.73762
.rsrc
0x00308000
0x00043200
0x00043200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.80643

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.95853
513
UNKNOWN
Portuguese - Brazil
RT_MANIFEST
2
3.35823
296
UNKNOWN
English - United States
RT_ICON
3
4.15461
5672
UNKNOWN
English - United States
RT_ICON
4
4.04528
3752
UNKNOWN
English - United States
RT_ICON
5
2.73868
2216
UNKNOWN
English - United States
RT_ICON
6
1.92438
1384
UNKNOWN
English - United States
RT_ICON
7
7.89428
9091
UNKNOWN
English - United States
RT_ICON
8
4.7262
38056
UNKNOWN
English - United States
RT_ICON
9
4.70773
26600
UNKNOWN
English - United States
RT_ICON
10
4.73972
21640
UNKNOWN
English - United States
RT_ICON

Imports

advapi32.dll
comctl32.dll
comdlg32.dll
gdi32.dll
kernel32.dll
kernel32.dll (delay-loaded)
mpr.dll
msimg32.dll
msvcrt.dll
ole32.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LATENTBOT a201dfd1858dd7beb422165ff251381b.exe

Process information

PID
CMD
Path
Indicators
Parent process
3208"C:\Users\admin\Desktop\a201dfd1858dd7beb422165ff251381b.exe" C:\Users\admin\Desktop\a201dfd1858dd7beb422165ff251381b.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
koglpwed Serviços do Windows
Version:
59.0.0.0
Total events
24
Read events
24
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
28
TCP/UDP connections
3
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3208
a201dfd1858dd7beb422165ff251381b.exe
POST
200
18.218.52.120:1992
http://18.218.52.120:1992/$rdgate?ACTION=START&ID=80565951307F4245A6D82A0E3A1BBCCA
US
binary
26 b
suspicious
3208
a201dfd1858dd7beb422165ff251381b.exe
POST
200
18.218.52.120:1992
http://18.218.52.120:1992/$rdgate?ACTION=HELLO
US
binary
29 b
suspicious
3208
a201dfd1858dd7beb422165ff251381b.exe
POST
200
18.218.52.120:1992
http://18.218.52.120:1992/$rdgate?ACTION=HELLO
US
binary
26 b
suspicious
3208
a201dfd1858dd7beb422165ff251381b.exe
POST
200
18.218.52.120:1992
http://18.218.52.120:1992/$rdgate?ID=80565951307F4245A6D82A0E3A1BBCCA
US
binary
14 b
suspicious
3208
a201dfd1858dd7beb422165ff251381b.exe
POST
200
18.218.52.120:1992
http://18.218.52.120:1992/$rdgate?ID=80565951307F4245A6D82A0E3A1BBCCA
US
binary
41 b
suspicious
3208
a201dfd1858dd7beb422165ff251381b.exe
POST
200
18.218.52.120:1992
http://18.218.52.120:1992/$rdgate?ACTION=START&ID=71C6CBA281064179AEFB86C2DC8D90E6
US
binary
27 b
suspicious
3208
a201dfd1858dd7beb422165ff251381b.exe
POST
18.218.52.120:1992
http://18.218.52.120:1992/$rdgate?ID=5A98768D6D6444D0A86D00D7F5F80464
US
suspicious
3208
a201dfd1858dd7beb422165ff251381b.exe
POST
410
18.218.52.120:1992
http://18.218.52.120:1992/$rdgate?ID=71C6CBA281064179AEFB86C2DC8D90E6
US
text
13 b
suspicious
3208
a201dfd1858dd7beb422165ff251381b.exe
POST
200
18.218.52.120:1992
http://18.218.52.120:1992/$rdgate?ACTION=HELLO&ID=
US
binary
28 b
suspicious
3208
a201dfd1858dd7beb422165ff251381b.exe
POST
410
18.218.52.120:1992
http://18.218.52.120:1992/$rdgate?ACTION=HELLO&ID=5A98768D6D6444D0A86D00D7F5F80464
US
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3208
a201dfd1858dd7beb422165ff251381b.exe
18.218.52.120:1992
recomeco2020.zapto.org
Amazon.com, Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
recomeco2020.zapto.org
  • 18.218.52.120
malicious

Threats

PID
Process
Class
Message
3208
a201dfd1858dd7beb422165ff251381b.exe
A Network Trojan was detected
MALWARE [PTsecurity] LatentBot HTTP POST Checkin
3208
a201dfd1858dd7beb422165ff251381b.exe
A Network Trojan was detected
SUSPICIOUS [PTsecurity] eStream SQL Remote Desktop
3208
a201dfd1858dd7beb422165ff251381b.exe
A Network Trojan was detected
SUSPICIOUS [PTsecurity] eStream SQL Remote Desktop
3208
a201dfd1858dd7beb422165ff251381b.exe
A Network Trojan was detected
MALWARE [PTsecurity] LatentBot HTTP POST Checkin
3208
a201dfd1858dd7beb422165ff251381b.exe
A Network Trojan was detected
SUSPICIOUS [PTsecurity] eStream SQL Remote Desktop
3208
a201dfd1858dd7beb422165ff251381b.exe
A Network Trojan was detected
SUSPICIOUS [PTsecurity] eStream SQL Remote Desktop
3208
a201dfd1858dd7beb422165ff251381b.exe
A Network Trojan was detected
SUSPICIOUS [PTsecurity] eStream SQL Remote Desktop
3208
a201dfd1858dd7beb422165ff251381b.exe
A Network Trojan was detected
SUSPICIOUS [PTsecurity] eStream SQL Remote Desktop
3208
a201dfd1858dd7beb422165ff251381b.exe
A Network Trojan was detected
SUSPICIOUS [PTsecurity] eStream SQL Remote Desktop
3208
a201dfd1858dd7beb422165ff251381b.exe
A Network Trojan was detected
MALWARE [PTsecurity] LatentBot HTTP POST Checkin
17 ETPRO signatures available at the full report
No debug info