analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

ca.bin.zip

Full analysis: https://app.any.run/tasks/e92e9537-b64a-4f79-9af3-398ea36023fb
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: July 11, 2019, 17:01:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
keylogger
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

AA51B7BCF104D6CB367EFEF48D4F65D5

SHA1:

FEE14D98610B3F2214C00DC6C76A65D9240C32A5

SHA256:

597604F50031988CCAD55DFDBD949D31C60B06D6E237F44B945D461C13A86DD6

SSDEEP:

12288:/R8E+pONGNEPl+EJ3+9A1vhVHJhvcK/LM9wB/eHJUj+J9RhSarA9IX+L0sPSGXdB:ZdcNXALVHEK/L9qJUiJA7IsFdRobP0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • ca.exe (PID: 2468)
      • ca.exe (PID: 3488)
    • Changes the autorun value in the registry

      • ca.exe (PID: 2468)
    • REMCOS RAT was detected

      • ca.exe (PID: 3488)
    • REMCOS was detected

      • ca.exe (PID: 3488)
    • Detected logs from REMCOS RAT

      • ca.exe (PID: 3488)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • ca.exe (PID: 2468)
      • WinRAR.exe (PID: 2992)
    • Suspicious files were dropped or overwritten

      • ca.exe (PID: 2468)
    • Application launched itself

      • ca.exe (PID: 2468)
    • Creates files in the user directory

      • ca.exe (PID: 3488)
    • Writes files like Keylogger logs

      • ca.exe (PID: 3488)
  • INFO

    • Manual execution by user

      • ca.exe (PID: 2468)
      • explorer.exe (PID: 1592)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: ca.bin
ZipUncompressedSize: 1277952
ZipCompressedSize: 848994
ZipCRC: 0xfc390359
ZipModifyDate: 2019:07:10 00:29:02
ZipCompression: Deflated
ZipBitFlag: 0x0001
ZipRequiredVersion: 788
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe ca.exe #REMCOS ca.exe explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2992"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\ca.bin.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2468"C:\Users\admin\Desktop\ca.exe" C:\Users\admin\Desktop\ca.exe
explorer.exe
User:
admin
Company:
How, Inc
Integrity Level:
HIGH
Description:
Free YouTube Downloader Setup Program
Version:
595.15.459.905
3488"C:\Users\admin\Desktop\ca.exe"C:\Users\admin\Desktop\ca.exe
ca.exe
User:
admin
Company:
How, Inc
Integrity Level:
HIGH
Description:
Free YouTube Downloader Setup Program
Version:
595.15.459.905
1592"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
477
Read events
452
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
0
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2468ca.exeC:\Users\Public\bKqoAfTmyH.vbstext
MD5:DC05C0BC3686D4B5E5772BAF51B17EC4
SHA256:2CD2D4579DD51AA4692FFC2DA0D7C7CE6962A068E60AE0E70B60CA4E61A65CF0
2992WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2992.661\ca.binexecutable
MD5:F7661B5B561CC67DABE2FF706704D0CC
SHA256:39EE9CE6D225D0464A5A80760993B22C151E60DAA128CA832C7CBC3A8705117A
3488ca.exeC:\Users\admin\AppData\Roaming\remcos\logs.dattext
MD5:A398CF97F7C2358EBA335CCC88A53A49
SHA256:DF96D435B09597D17E37100FD55EAF7FC1F7260BF0F3DD266972B03C498BD845
2468ca.exeC:\Users\admin\wydad\vcasehdndbnseb.batexecutable
MD5:0FF7B809CC797B91AA775A48FF90B68F
SHA256:14DEC20B99F4DB1114EC1A44F03EDACE45C4D94938AD38C158E007530FA2FE63
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
55
DNS requests
5
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3488
ca.exe
178.239.21.3:8234
cazt01money.ddns.net
Telekomunikacije Republike Srpske akcionarsko drustvo Banja Luka
BA
malicious

DNS requests

Domain
IP
Reputation
cazt01money.ddns.net
  • 178.239.21.3
malicious

Threats

No threats detected
No debug info