analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

freeformatter-decoded(3).7z

Full analysis: https://app.any.run/tasks/e69dbcba-be19-4ea7-a133-5a09a0cbcdd2
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 21, 2019, 12:45:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
redaman
trojan
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

D4B0CCD55A68EF56E7EFA207C8037B41

SHA1:

9509773A22CD05D01534D9F4083E5F8FA03E9C19

SHA256:

706F5DD7DFC78E14F0C96AA0B6446348FAEAE71FB28FE0436FB41A26DA0BDD90

SSDEEP:

6144:emvogqxWr1ZmkpqlybxfNYe5xFJeUw9GQihKwrsevehSGNyDe2R:HvoZ0qkpcIRNYaeLiowRbR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 2704)
      • WinRAR.exe (PID: 2212)
      • Договор 21.03.exe (PID: 2256)
    • Application was dropped or rewritten from another process

      • Договор 21.03.exe (PID: 2256)
    • Loads the Task Scheduler COM API

      • Договор 21.03.exe (PID: 2256)
    • REDAMAN was detected

      • rundll32.exe (PID: 2704)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2212)
      • Договор 21.03.exe (PID: 2256)
    • Creates files in the program directory

      • Договор 21.03.exe (PID: 2256)
    • Connects to unusual port

      • rundll32.exe (PID: 2704)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
3
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start winrar.exe договор 21.03.exe #REDAMAN rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
2212"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\freeformatter-decoded(3).7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2256"C:\Users\admin\AppData\Local\Temp\Rar$EXa2212.39882\Договор 21.03.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2212.39882\Договор 21.03.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2704rundll32.exe "C:\ProgramData\2401bf603c90\2702bc633f93.dat",DllGetClassObject rootC:\Windows\system32\rundll32.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
455
Read events
440
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2704rundll32.exeC:\Users\admin\AppData\Local\Temp\D151.tmp
MD5:
SHA256:
2704rundll32.exeC:\Users\admin\AppData\Local\Temp\pbikjajieohhncdd
MD5:
SHA256:
2704rundll32.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2212.39882\Договор 21.03.exe
MD5:
SHA256:
2704rundll32.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2212.39882\pafpjmeoagenddcm
MD5:
SHA256:
2212WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2212.39882\Договор 21.03.exeexecutable
MD5:83BA4EBE87F7907A41EDC9C91B2DDF9A
SHA256:1A75C84533DDAF1D9DC3C62CABB3D310D8377D8BA23A9A26EBA8AC0C136550BA
2256Договор 21.03.exeC:\Users\admin\AppData\Local\Temp\D151.tmpexecutable
MD5:3E8235809E544B7DBAA9971E20A7FE72
SHA256:7C33B5D66DACFACF54123CEC65D431779726CAA5F647FB5B816167A580CCBB21
2256Договор 21.03.exeC:\ProgramData\2401bf603c90\2702bc633f93.datexecutable
MD5:3E8235809E544B7DBAA9971E20A7FE72
SHA256:7C33B5D66DACFACF54123CEC65D431779726CAA5F647FB5B816167A580CCBB21
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
65
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2704
rundll32.exe
GET
200
178.62.9.171:80
http://myip.ru/index_small.php
GB
html
321 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2704
rundll32.exe
185.225.17.3:443
suspicious
2704
rundll32.exe
108.161.139.183:9001
TekTonic
US
suspicious
2704
rundll32.exe
35.168.202.103:443
Amazon.com, Inc.
US
suspicious
2704
rundll32.exe
192.155.83.101:9001
Linode, LLC
US
suspicious
2704
rundll32.exe
94.23.247.42:443
OVH SAS
FR
suspicious
2704
rundll32.exe
178.62.9.171:80
myip.ru
Digital Ocean, Inc.
GB
malicious
2704
rundll32.exe
207.192.70.250:9001
Linode, LLC
US
suspicious
2704
rundll32.exe
93.115.26.200:8534
UAB Cherry Servers
LT
suspicious
2704
rundll32.exe
185.198.26.149:9001
HostHatch, Inc
NL
suspicious
2704
rundll32.exe
46.249.59.206:23031
Serverius Holding B.V.
NL
suspicious

DNS requests

Domain
IP
Reputation
myip.ru
  • 178.62.9.171
unknown
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
2704
rundll32.exe
Potential Corporate Privacy Violation
ET POLICY myip.ru IP lookup
2704
rundll32.exe
A Network Trojan was detected
ET TROJAN [PTsecurity] Win32/Spy.RTM/Redaman IP Check
2704
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.RTM.N (Redaman) IP Check
2704
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 712
2704
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 98
2704
rundll32.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
2704
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 479
2704
rundll32.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
2704
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Suspicious TOR Connection (Possible Spy.Ursnif/RTM/Crypt0l0cker activity)
2704
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Suspicious TOR Connection (Possible Spy.Ursnif/RTM/Crypt0l0cker activity)
No debug info