File name: | File268795.exe |
Full analysis: | https://app.any.run/tasks/f0688be9-f5f5-4538-bcd2-9a764a61ccb6 |
Verdict: | Malicious activity |
Analysis date: | December 14, 2018, 13:51:30 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | D65C261657C318E80AE6F770CD60E743 |
SHA1: | 9B3D156C45DD16F2BBB84B09BB15E8FB8DEFC84F |
SHA256: | 55B6FF5556933475AAA6F9C67E518A1D9F285BE07269BC5555C20A93A472935B |
SSDEEP: | 24576:hyyYs7+znoLvEY8oNoYk8S2C4lSuRDOZernuprGgHB97b1cci4V7Xu3pP4iN:QyY2+z88o7i4PR1juZ3Hz7RciF+3R4i |
.exe | | | Clipper DOS Executable (33.5) |
---|---|---|
.exe | | | Generic Win/DOS Executable (33.2) |
.exe | | | DOS Executable Generic (33.2) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2018:12:14 14:43:18+01:00 |
PEType: | PE32 |
LinkerVersion: | 6 |
CodeSize: | 856064 |
InitializedDataSize: | 827392 |
UninitializedDataSize: | - |
EntryPoint: | 0xcdb80 |
OSVersion: | 4 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 14-Dec-2018 13:43:18 |
Detected languages: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000078 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 6 |
Time date stamp: | 14-Dec-2018 13:43:18 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
79576 | 0x000D2000 | 0x000011B6 | 0x00002000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.62847 |
79577 | 0x000D4000 | 0x0002D45C | 0x00003000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.485328 |
79578 | 0x00102000 | 0x00000085 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.261663 |
79579 | 0x00103000 | 0x000C2000 | 0x000C2000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.99512 |
.79575 | 0x00001000 | 0x000D021D | 0x000D1000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.84415 |
7957a | 0x001C5000 | 0x000018D0 | 0x00002000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 1.84253 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 5.21707 | 1723 | Latin 1 / Western European | English - Australia | RT_MANIFEST |
2 | 5.07571 | 1384 | Latin 1 / Western European | English - United States | RT_ICON |
3 | 6.10549 | 872 | Latin 1 / Western European | English - United States | RT_ICON |
4 | 3.74743 | 744 | Latin 1 / Western European | English - United States | RT_ICON |
5 | 6.23414 | 2216 | Latin 1 / Western European | English - United States | RT_ICON |
6 | 5.96389 | 3240 | Latin 1 / Western European | English - United States | RT_ICON |
7 | 3.28585 | 1640 | Latin 1 / Western European | English - United States | RT_ICON |
8 | 5.35345 | 3752 | Latin 1 / Western European | English - United States | RT_ICON |
9 | 4.94859 | 7336 | Latin 1 / Western European | English - United States | RT_ICON |
10 | 5.55446 | 1128 | Latin 1 / Western European | English - United States | RT_ICON |
ADVAPI32.dll |
GDI32.dll |
KERNEL32.dll |
USER32.dll |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | POST | 200 | 116.203.1.133:80 | http://static.133.1.203.116.clients.your-server.de/request/conditions?user=luxsoft&ver=10&key=4144e3b67484930ad60890c9b1452246&token=d2d549322f61e2afddbf86bf830296e2 | IN | text | 416 b | malicious |
— | — | GET | 200 | 162.144.221.178:80 | http://www.getgosoft.com/getgodm/thankyou | US | html | 12.2 Kb | suspicious |
— | — | POST | 200 | 116.203.1.133:80 | http://static.133.1.203.116.clients.your-server.de/request/autok?user=luxsoft&ver=10&key=a8d588afe11b4f83598303abd1b1afc3 | IN | text | 140 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 162.144.221.178:80 | www.getgosoft.com | Unified Layer | US | suspicious |
— | — | 116.203.1.133:80 | static.133.1.203.116.clients.your-server.de | 334,Udyog Vihar | IN | malicious |
Domain | IP | Reputation |
---|---|---|
static.133.1.203.116.clients.your-server.de |
| malicious |
www.getgosoft.com |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | A Network Trojan was detected | ET MALWARE Luxsoft Win32/ICLoader User-Agent |
— | — | A Network Trojan was detected | SC ADWARE Adware ICLoader Win32 |
— | — | Misc activity | ADWARE [PTsecurity] Application.Bundler.ICLoader Response |
— | — | A Network Trojan was detected | ET MALWARE Luxsoft Win32/ICLoader User-Agent |
— | — | A Network Trojan was detected | SC ADWARE SoftwareBundler:Win32/ICLoader |