analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://www.virusign.com/home.php?d=0&r=100&c=hashes&o=date&s=DESC&n=EXACT&p=1

Full analysis: https://app.any.run/tasks/95f958f3-aece-4293-9fa3-8af72db7aab6
Verdict: Malicious activity
Threats:

Predator, the Thief, is an information stealer, meaning that malware steals data from infected systems. This virus can access the camera and spy on victims, steal passwords and login information, and retrieve payment data from cryptocurrency wallets.

Analysis date: August 18, 2019, 07:10:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
stealer
predator
Indicators:
MD5:

AFE870FE890EADDD806E0B748D2FABC5

SHA1:

45823F19D01EA267CFD517073C188E6382CDFD89

SHA256:

5BC92484CDDA53BB9EF2594AC5FE426F633D641683DF215A5FF35EB2663D3F7B

SSDEEP:

3:N1KJS4AXvd9KJwB4L5VpPrvKYy0f22mIgGUn:Cc4AFo++VpPOYy0u2mIgDn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Tin86.exe (PID: 3148)
      • rjun.exe (PID: 3364)
      • Tin86.exe (PID: 3704)
    • PREDATOR was detected

      • rjun.exe (PID: 3364)
    • Connects to CnC server

      • rjun.exe (PID: 3364)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3548)
      • WinRAR.exe (PID: 1020)
    • Reads the cookies of Google Chrome

      • rjun.exe (PID: 3364)
    • Creates files in the user directory

      • rjun.exe (PID: 3364)
    • Reads the cookies of Mozilla Firefox

      • rjun.exe (PID: 3364)
    • Connects to server without host name

      • rjun.exe (PID: 3364)
    • Starts CMD.EXE for self-deleting

      • rjun.exe (PID: 3364)
    • Application launched itself

      • taskmgr.exe (PID: 3468)
    • Starts CMD.EXE for commands execution

      • rjun.exe (PID: 3364)
  • INFO

    • Creates files in the user directory

      • opera.exe (PID: 3528)
    • Manual execution by user

      • taskmgr.exe (PID: 3468)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
12
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start opera.exe winrar.exe no specs winrar.exe tin86.exe no specs tin86.exe no specs winrar.exe no specs winrar.exe #PREDATOR rjun.exe cmd.exe no specs ping.exe no specs taskmgr.exe no specs taskmgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
3528"C:\Program Files\Opera\opera.exe" "http://www.virusign.com/home.php?d=0&r=100&c=hashes&o=date&s=DESC&n=EXACT&p=1"C:\Program Files\Opera\opera.exe
explorer.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Internet Browser
Exit code:
0
Version:
1748
2668"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Opera\Opera\temporary_downloads\d8993a989dc0addf42872eb02a4f158a07bd43d39c27f0907f7575d229d63afa.7z"C:\Program Files\WinRAR\WinRAR.exeopera.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3548"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Opera\Opera\temporary_downloads\0b17ec706713b9078cfbedcd2c4fbdbfe2df0be6963e2431f0c0ac43712ab6c9.7z"C:\Program Files\WinRAR\WinRAR.exe
opera.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3148"C:\Users\admin\AppData\Local\Temp\Rar$EXb3548.28696\Tin86.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3548.28696\Tin86.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Print UI Cache
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3704"C:\Users\admin\AppData\Local\Temp\Rar$EXb3548.28696\Tin86.exe"C:\Users\admin\AppData\Local\Temp\Rar$EXb3548.28696\Tin86.exeTin86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Print UI Cache
Exit code:
3221225477
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2684"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Opera\Opera\temporary_downloads\440fc8c1c9f8f39a6f490209c8034c11d9c6b47bc043cd91a6bc6041691b4995.7z"C:\Program Files\WinRAR\WinRAR.exeopera.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
1020"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Opera\Opera\temporary_downloads\abd5c22fc4a791e82ab18be6f73858087decf7cfa2798a1fa47e181b386960a5.7z"C:\Program Files\WinRAR\WinRAR.exe
opera.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3364"C:\Users\admin\AppData\Local\Temp\Rar$EXb1020.33482\rjun.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb1020.33482\rjun.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3752"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\admin\AppData\Local\Temp\Rar$EXb1020.33482\rjun.exe"C:\Windows\system32\cmd.exerjun.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
840ping 127.0.0.1 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
2 567
Read events
2 328
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
50
Text files
24
Unknown types
7

Dropped files

PID
Process
Filename
Type
3528opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\oprA0F8.tmp
MD5:
SHA256:
3528opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\oprA0F9.tmp
MD5:
SHA256:
3528opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\oprA148.tmp
MD5:
SHA256:
3528opera.exeC:\Users\admin\AppData\Local\Opera\Opera\cache\sesn\opr00001.tmp
MD5:
SHA256:
3528opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HVPVSZW18RNQNKMRUMV7.temp
MD5:
SHA256:
3528opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opssl6.datbinary
MD5:5508D4C3F859002E51CF46F95D3B42BA
SHA256:8938E00BA29333F2E95DD05DB392FE65DF3958344D51E508D9751224E64F6AAF
3528opera.exeC:\Users\admin\AppData\Local\Opera\Opera\icons\www.virusign.com.idxtext
MD5:E2A55CC9DD0F6A69E955AF54F5A1761F
SHA256:49DE1F2F0A3564B1391D776009529E69724170C7AE2FF6C5647DEAF85D42316A
3528opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\operaprefs.initext
MD5:0B3D6D6EDB91F42D60B7A33BA7D3D11A
SHA256:C0E13471A3F52D9A6C239D1514BEAF1B956B90ABD2A0B6DE2A37E387C97D013A
3528opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\oprAE0A.tmp
MD5:
SHA256:
3528opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\oprE48C.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
11
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3528
opera.exe
GET
178.32.62.43:80
http://www.virusign.com/images/doc_hashes.svg
GB
whitelisted
3528
opera.exe
GET
178.32.62.43:80
http://www.virusign.com/images/virusign_logo.svg
GB
whitelisted
3528
opera.exe
GET
178.32.62.43:80
http://www.virusign.com/images/info_balloon.svg
GB
whitelisted
3528
opera.exe
GET
178.32.62.43:80
http://www.virusign.com/images/home_blue.svg
GB
whitelisted
3528
opera.exe
GET
200
178.32.62.43:80
http://www.virusign.com/images/anti_skull.svg
GB
image
4.23 Kb
whitelisted
3528
opera.exe
GET
200
178.32.62.43:80
http://www.virusign.com/images/transparent.gif
GB
image
815 b
whitelisted
3528
opera.exe
GET
200
178.32.62.43:80
http://www.virusign.com/images/upload_skull.svg
GB
image
3.93 Kb
whitelisted
3528
opera.exe
GET
200
178.32.62.43:80
http://www.virusign.com/images/7zip.svg
GB
image
1.31 Kb
whitelisted
3528
opera.exe
GET
200
178.32.62.43:80
http://www.virusign.com/file/d8993a989dc0addf42872eb02a4f158a07bd43d39c27f0907f7575d229d63afa.7z
GB
compressed
45.6 Kb
whitelisted
3528
opera.exe
GET
200
178.32.62.43:80
http://www.virusign.com/file/440fc8c1c9f8f39a6f490209c8034c11d9c6b47bc043cd91a6bc6041691b4995.7z
GB
compressed
23.0 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3528
opera.exe
185.26.182.94:443
sitecheck2.opera.com
Opera Software AS
whitelisted
3528
opera.exe
185.26.182.93:80
sitecheck2.opera.com
Opera Software AS
whitelisted
3528
opera.exe
93.184.220.29:80
crl4.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3364
rjun.exe
92.63.192.228:80
IT DeLuxe Ltd.
RU
malicious
3528
opera.exe
178.32.62.43:80
www.virusign.com
OVH SAS
GB
suspicious

DNS requests

Domain
IP
Reputation
www.virusign.com
  • 178.32.62.43
whitelisted
sitecheck2.opera.com
  • 185.26.182.93
  • 185.26.182.94
  • 185.26.182.111
  • 185.26.182.112
whitelisted
certs.opera.com
  • 185.26.182.94
  • 185.26.182.93
whitelisted
crl4.digicert.com
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
3528
opera.exe
Potential Corporate Privacy Violation
ET POLICY Outgoing Basic Auth Base64 HTTP Password detected unencrypted
3364
rjun.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.Agent.PLQ (Predator Stealer) CnC Checkin
2 ETPRO signatures available at the full report
No debug info