analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Документы за февраль.gz

Full analysis: https://app.any.run/tasks/70f410e9-b40b-45c6-b52c-51c9569ac254
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 21, 2019, 11:35:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
redaman
Indicators:
MIME: application/gzip
File info: gzip compressed data, was "\304\356\352\363\354\345\355\362\373 \347\340 \364\345\342\360\340\353\374.exe", last modified: Tue Mar 19 21:03:23 2019, max speed, from FAT filesystem (MS-DOS, OS/2, NT)
MD5:

018DB4BC43FC12E865D2D1CB9B4F36E4

SHA1:

431CD209F57D158F42ACA0CBE1E68FDB4BBB1FC0

SHA256:

A4175C87C8474D1BB7F606B1481761E5BD5E39F88B368539051A730EF47075B1

SSDEEP:

6144:IN3CJY6QsctcUWFHLaEH7nkSPHYc+aM/UIBuViq3tnbDaiPaRIk4w5065Y8O43b:IBJ6zc2LFHL/wAYc+HuViqdnbDaiPWpr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Äîêóìåíòû çà ôåâðàëü.exe (PID: 3584)
    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 3912)
      • Äîêóìåíòû çà ôåâðàëü.exe (PID: 3584)
      • explorer.exe (PID: 2036)
      • WinRAR.exe (PID: 3088)
    • REDAMAN was detected

      • rundll32.exe (PID: 3912)
    • Loads the Task Scheduler COM API

      • Äîêóìåíòû çà ôåâðàëü.exe (PID: 3584)
  • SUSPICIOUS

    • Creates files in the user directory

      • explorer.exe (PID: 2036)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3088)
      • Äîêóìåíòû çà ôåâðàëü.exe (PID: 3584)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 2036)
    • Creates files in the program directory

      • Äîêóìåíòû çà ôåâðàëü.exe (PID: 3584)
    • Connects to unusual port

      • rundll32.exe (PID: 3912)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.z/gz/gzip | GZipped data (100)

EXIF

ZIP

Compression: Deflated
Flags: FileName
ModifyDate: 2019:03:19 22:03:23+01:00
ExtraFlags: Fastest Algorithm
OperatingSystem: FAT filesystem (MS-DOS, OS/2, NT/Win32)
ArchivedFileName: ????????? ?? ???????.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
5
Malicious processes
1
Suspicious processes
3

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs winrar.exe äîêóìåíòû çà ôåâðàëü.exe #REDAMAN rundll32.exe explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3456"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Документы за февраль.gz.z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3088"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Документы за февраль.gz.z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3584"C:\Users\admin\AppData\Local\Temp\Rar$EXa3088.15244\Äîêóìåíòû çà ôåâðàëü.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3088.15244\Äîêóìåíòû çà ôåâðàëü.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3912rundll32.exe "C:\ProgramData\2401bf603c90\2702bc633f93.dat",DllGetClassObject rootC:\Windows\system32\rundll32.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2036C:\Windows\Explorer.EXEC:\Windows\explorer.exeSearchFilterHost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 633
Read events
1 584
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
0
Text files
0
Unknown types
4

Dropped files

PID
Process
Filename
Type
3912rundll32.exeC:\Users\admin\AppData\Local\Temp\57B7.tmp
MD5:
SHA256:
3912rundll32.exeC:\Users\admin\AppData\Local\Temp\hemeohoemedfcbop
MD5:
SHA256:
3912rundll32.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3088.15244\Äîêóìåíòû çà ôåâðàëü.exe
MD5:
SHA256:
3912rundll32.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3088.15244\ohppcjdphgichgng
MD5:
SHA256:
3584Äîêóìåíòû çà ôåâðàëü.exeC:\Users\admin\AppData\Local\Temp\57B7.tmpexecutable
MD5:34496B29C41AABF7CCDF431F9ED88530
SHA256:82B27FCE56AA519C15B7FE954D7A3B8F155DEC692B4378934C1F72451F726C22
2036explorer.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019032120190322\index.datdat
MD5:80BAAC66714B9953A234E8228EA2442E
SHA256:BC36FE9A29A493560CFBF1AD709F81F76FC69B013153C7D7293F423021CED6FC
2036explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-msautomaticdestinations-ms
MD5:4F29DCBBC89D318EA5BE8579311A7512
SHA256:3CBCEE4284C7D1D5C0165B1CE06610799F4C5AD4E0C2493C10E8F9BFD1835BF1
3088WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3088.15244\Äîêóìåíòû çà ôåâðàëü.exeexecutable
MD5:00C6E8E05A3BF9A1A84F9092DD5E15CC
SHA256:EB8035345CE22D91AA9A0C72D59D52AF8F750758DFCB1924F160585F4541E95C
3584Äîêóìåíòû çà ôåâðàëü.exeC:\ProgramData\2401bf603c90\2702bc633f93.datexecutable
MD5:34496B29C41AABF7CCDF431F9ED88530
SHA256:82B27FCE56AA519C15B7FE954D7A3B8F155DEC692B4378934C1F72451F726C22
2036explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-msautomaticdestinations-ms
MD5:4F31EAE731C3E441C094388F8DE746B0
SHA256:7E1756ECE56977504F063C4B0D9E7F84B43A410930457618B0D691E6E46B934D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
7
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3912
rundll32.exe
GET
200
178.62.9.171:80
http://myip.ru/index_small.php
GB
html
323 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3912
rundll32.exe
178.62.9.171:80
myip.ru
Digital Ocean, Inc.
GB
malicious
3912
rundll32.exe
82.102.20.254:31315
GB
suspicious
3912
rundll32.exe
185.198.26.149:9001
HostHatch, Inc
NL
suspicious
3912
rundll32.exe
23.129.64.101:443
US
suspicious
3912
rundll32.exe
37.187.177.2:9001
OVH SAS
FR
suspicious
3912
rundll32.exe
172.105.198.191:9100
US
suspicious
3912
rundll32.exe
94.23.247.42:443
OVH SAS
FR
suspicious

DNS requests

Domain
IP
Reputation
myip.ru
  • 178.62.9.171
unknown

Threats

PID
Process
Class
Message
3912
rundll32.exe
Potential Corporate Privacy Violation
ET POLICY myip.ru IP lookup
3912
rundll32.exe
A Network Trojan was detected
ET TROJAN [PTsecurity] Win32/Spy.RTM/Redaman IP Check
3912
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.RTM.N (Redaman) IP Check
3912
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 612
3912
rundll32.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
3912
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Suspicious TOR Connection (Possible Spy.Ursnif/RTM/Crypt0l0cker activity)
3912
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Suspicious TOR Connection (Possible Spy.Ursnif/RTM/Crypt0l0cker activity)
3912
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 233
3912
rundll32.exe
Misc activity
ET POLICY TLS possible TOR SSL traffic
3912
rundll32.exe
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 450
No debug info