analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

btc [email protected]

Full analysis: https://app.any.run/tasks/ad6ecfb7-b233-445c-8741-67b0ffe2d702
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: July 12, 2020, 21:35:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
njrat
bladabindi
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

4AEB0A314EF2A4C50ADEF2711D3B8210

SHA1:

D48D275DACE5347FE6F2A54012D30931C496BE17

SHA256:

AC1E94A0CCB26FDF90A44545C35C529AF5F7B13640FF922D83E701A601AE59E5

SSDEEP:

196608:bYa+x+5L0kXYSeziYcsGtsBux0P04cur97c7bsV54VFys9GNTRTS3jlll:bRakoStYcsWsBuxq04cu4gVU5MMpr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • svchost.exe (PID: 2764)
      • Blockchain checker.exe (PID: 2400)
      • WindowsFormsApplication1.exe (PID: 304)
      • 1.exe (PID: 2352)
      • 1.exe (PID: 2680)
      • Blockchain checker.exe (PID: 2148)
      • Blockchain checker.exe (PID: 1676)
      • 1.exe (PID: 1976)
      • 1.exe (PID: 2136)
      • WindowsFormsApplication1.exe (PID: 3032)
      • Blockchain checker.exe (PID: 760)
      • 1.exe (PID: 2424)
      • Blockchain checker.exe (PID: 2388)
      • 1.exe (PID: 3324)
      • Blockchain checker.exe (PID: 2004)
      • WindowsFormsApplication1.exe (PID: 328)
      • 1.exe (PID: 2760)
      • WindowsFormsApplication1.exe (PID: 3128)
      • Blockchain checker.exe (PID: 1364)
      • Blockchain checker.exe (PID: 3436)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3568)
    • Writes to a start menu file

      • svchost.exe (PID: 2764)
    • Changes the autorun value in the registry

      • svchost.exe (PID: 2764)
    • NJRAT was detected

      • svchost.exe (PID: 2764)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Blockchain checker.exe (PID: 2148)
      • 1.exe (PID: 2680)
      • WindowsFormsApplication1.exe (PID: 304)
      • svchost.exe (PID: 2764)
      • WinRAR.exe (PID: 988)
      • Blockchain checker.exe (PID: 1676)
      • 1.exe (PID: 2136)
      • Blockchain checker.exe (PID: 2388)
      • 1.exe (PID: 3324)
      • Blockchain checker.exe (PID: 1364)
      • 1.exe (PID: 2760)
    • Starts itself from another location

      • WindowsFormsApplication1.exe (PID: 304)
    • Creates files in the user directory

      • 1.exe (PID: 2680)
      • svchost.exe (PID: 2764)
      • WindowsFormsApplication1.exe (PID: 304)
    • Creates executable files which already exist in Windows

      • WindowsFormsApplication1.exe (PID: 304)
    • Uses NETSH.EXE for network configuration

      • svchost.exe (PID: 2764)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • 1.exe (PID: 2680)
      • 1.exe (PID: 2136)
      • 1.exe (PID: 3324)
      • 1.exe (PID: 2760)
    • Manual execution by user

      • Blockchain checker.exe (PID: 1676)
      • Blockchain checker.exe (PID: 2388)
      • Blockchain checker.exe (PID: 1364)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
80
Monitored processes
23
Malicious processes
6
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start winrar.exe blockchain checker.exe 1.exe no specs 1.exe windowsformsapplication1.exe blockchain checker.exe #NJRAT svchost.exe netsh.exe no specs searchprotocolhost.exe no specs blockchain checker.exe 1.exe no specs 1.exe windowsformsapplication1.exe no specs blockchain checker.exe blockchain checker.exe 1.exe no specs 1.exe windowsformsapplication1.exe no specs blockchain checker.exe blockchain checker.exe 1.exe windowsformsapplication1.exe no specs blockchain checker.exe

Process information

PID
CMD
Path
Indicators
Parent process
988"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\btc [email protected]"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2148"C:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\Blockchain checker.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\Blockchain checker.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
2352"C:\Users\admin\AppData\Local\Temp\1.exe" C:\Users\admin\AppData\Local\Temp\1.exeBlockchain checker.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
2680"C:\Users\admin\AppData\Local\Temp\1.exe" C:\Users\admin\AppData\Local\Temp\1.exe
Blockchain checker.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
304"C:\Users\admin\AppData\Roaming\WindowsFormsApplication1.exe" C:\Users\admin\AppData\Roaming\WindowsFormsApplication1.exe
1.exe
User:
admin
Integrity Level:
HIGH
Description:
WindowsFormsApplication1
Exit code:
0
Version:
1.0.0.0
2400"C:\Users\admin\AppData\Roaming\Blockchain checker.exe" C:\Users\admin\AppData\Roaming\Blockchain checker.exe
1.exe
User:
admin
Integrity Level:
HIGH
Description:
BTCdotCom
Exit code:
3762504530
Version:
1.0.0.0
2764"C:\Users\admin\AppData\Roaming\svchost.exe" C:\Users\admin\AppData\Roaming\svchost.exe
WindowsFormsApplication1.exe
User:
admin
Integrity Level:
HIGH
Description:
WindowsFormsApplication1
Version:
1.0.0.0
2120netsh firewall add allowedprogram "C:\Users\admin\AppData\Roaming\svchost.exe" "svchost.exe" ENABLEC:\Windows\system32\netsh.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3568"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe3_ Global\UsGthrCtrlFltPipeMssGthrPipe3 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
1676"C:\Users\admin\Desktop\Blockchain checker.exe" C:\Users\admin\Desktop\Blockchain checker.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Total events
3 898
Read events
3 642
Write events
0
Delete events
0

Modification events

No data
Executable files
26
Suspicious files
0
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\Alternates.txttext
MD5:001BEC4C68AA6C05790A3C7D74810C93
SHA256:739462862381308882B6CBB3A7622E42F8735D54037C2069131F731023737761
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\btc.txttext
MD5:DFED73A1D9ED4B2C1977A429B53DB60C
SHA256:C1795A60395F2F10AAC79075A9EC640689026EB6E9801DC970432BFBB59F1B4F
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa988.10934\btc checker@\Blockchain checker.exeexecutable
MD5:1E80DCDA77247C70B7057C525ECFCBB2
SHA256:09BCB7382875654CD6BC2F3AEF1672923C3048D3E3E7B5438CA61D960C64B529
26801.exeC:\Users\admin\AppData\Roaming\Blockchain checker.exeexecutable
MD5:087C138F1CC2767C8F8C9E24ABC4BEB3
SHA256:BF2AD15CA2C88B6D10542CBC04CEBF3642A124D4986FB0A7A64468DBB96FDA64
2148Blockchain checker.exeC:\Users\admin\AppData\Local\Temp\2.exeexecutable
MD5:D8FAEA32E5AEE9C2D942D45B08EB32D4
SHA256:D6408BFDE4C0B242EB1853CCE2D91BC316089219BBB13757B90D65ACDE820451
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\Blockchain checker.exeexecutable
MD5:1E80DCDA77247C70B7057C525ECFCBB2
SHA256:09BCB7382875654CD6BC2F3AEF1672923C3048D3E3E7B5438CA61D960C64B529
2148Blockchain checker.exeC:\Users\admin\AppData\Local\Temp\1.exeexecutable
MD5:56E71A9DC2F9C92DF7B9956564CA7560
SHA256:F53AE582E2FE2D5BBF018DBCCE173440B661A0C02AFB680AFA35F9762FC0D63F
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\Leaf.xNet.dllexecutable
MD5:E67C43E92EC7C2BE50E341249F249E67
SHA256:1AF0DAF4705F93B449A0FA834464DE7B2AF1F3E33F442B75D30E4EF0B2DD0E4B
2764svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\718549aff011e58ec6f1edb7f6b0cf01.exeexecutable
MD5:EBEF82A2765AECB85FFF7C55F0E100A5
SHA256:64E7C6B26814F85CB08882ADA788C415635FC30A554AB1B6C11B46FD17BCC173
988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa988.8015\btc checker@\proxy.txttext
MD5:69FF51D9356D851C36A3F775005F309C
SHA256:4D0B12B4CD9F378998C99F89A652BADF57D15896EE16C1906CE2D88E9B34A22E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

Domain
IP
Reputation
scarerose.servegame.com
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.servegame .com
No debug info