| File name: | Sentry Mba 2020.rar |
| Full analysis: | https://app.any.run/tasks/4bc0df69-3b36-47cc-82c2-371282355869 |
| Verdict: | Malicious activity |
| Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
| Analysis date: | March 30, 2021, 04:04:26 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 2408484B39868ADC66BD5730CCB4D1D1 |
| SHA1: | 5EC56B0976703E4CF3F594F35D5F22E2023BF1B2 |
| SHA256: | B585A78AD9CA7D5DEA84647B43B1EAFA2949A63BAB838BB69D668967FF1CE450 |
| SSDEEP: | 196608:LDVklQyCPX8MEvlroN4o34zfJUNGEbeML3NDyGCJBDSQ:ryCPXOrroIKNGEb77NDmGQ |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 924 | "C:\Users\admin\AppData\Local\Temp\WVDEVIWW.EXE" | C:\Users\admin\AppData\Local\Temp\WVDEVIWW.EXE | CTEagles_MBY.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 988 | "C:\Users\admin\AppData\Local\Temp\CTEAGLES_MBY.EXE" | C:\Users\admin\AppData\Local\Temp\CTEAGLES_MBY.EXE | CTEagles_MBY.exe | ||||||||||||
User: admin Company: yp140 Integrity Level: MEDIUM Description: CTEagles_MBY Exit code: 4294967295 Version: 2.2.0.3 Modules
| |||||||||||||||
| 1836 | "C:\Users\admin\Desktop\Eagle2203\CTEagles_MBY.exe" | C:\Users\admin\Desktop\Eagle2203\CTEagles_MBY.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 1 Modules
| |||||||||||||||
| 2984 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Sentry Mba 2020.rar" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
| 3180 | "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\System32\SearchProtocolHost.exe | — | SearchIndexer.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Exit code: 0 Version: 7.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2984) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Sentry Mba 2020.rar | |||
| (PID) Process: | (2984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3180) SearchProtocolHost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\13D\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3180) SearchProtocolHost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\13D\52C64B7E |
| Operation: | write | Name: | @C:\Windows\system32\notepad.exe,-469 |
Value: Text Document | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\AForge.dll | executable | |
MD5:— | SHA256:— | |||
| 2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\2Captcha.dll | executable | |
MD5:— | SHA256:— | |||
| 2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\CTEagles_MBY.exe | executable | |
MD5:— | SHA256:— | |||
| 2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\CTEagles_MBY.xml | xml | |
MD5:— | SHA256:— | |||
| 2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\CTEagles_MBY.exe.config | xml | |
MD5:— | SHA256:— | |||
| 2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\GlobalKeys.ini | html | |
MD5:— | SHA256:— | |||
| 2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\Debug.html | html | |
MD5:— | SHA256:— | |||
| 2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\Samples\yp1.tiff | image | |
MD5:— | SHA256:— | |||
| 2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\Samples\yp2.tiff | image | |
MD5:— | SHA256:— | |||
| 2984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2984.42891\Eagle2203\Samples\yp4.tiff | image | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
988 | CTEAGLES_MBY.EXE | GET | 301 | 172.67.180.162:80 | http://crackerteam.com/cracker.php | US | — | — | suspicious |
924 | WVDEVIWW.EXE | POST | — | 170.39.77.7:443 | http://tenntechs.com:443/access/index.php | unknown | — | — | malicious |
988 | CTEAGLES_MBY.EXE | GET | 200 | 162.88.193.70:80 | http://checkip.dyndns.org/ | US | html | 105 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
924 | WVDEVIWW.EXE | 170.39.77.7:443 | tenntechs.com | — | — | malicious |
988 | CTEAGLES_MBY.EXE | 172.67.180.162:80 | crackerteam.com | — | US | unknown |
988 | CTEAGLES_MBY.EXE | 172.67.180.162:443 | crackerteam.com | — | US | unknown |
988 | CTEAGLES_MBY.EXE | 104.21.43.149:443 | crackerteam.com | Cloudflare Inc | US | unknown |
988 | CTEAGLES_MBY.EXE | 162.88.193.70:80 | checkip.dyndns.org | — | US | malicious |
Domain | IP | Reputation |
|---|---|---|
tenntechs.com |
| malicious |
crackerteam.com |
| suspicious |
www.crackerteam.com |
| suspicious |
checkip.dyndns.org |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
924 | WVDEVIWW.EXE | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
924 | WVDEVIWW.EXE | A Network Trojan was detected | ET TROJAN Win32/AZORult V3.3 Client Checkin M2 |
924 | WVDEVIWW.EXE | A Network Trojan was detected | STEALER [PTsecurity] AZORult |
924 | WVDEVIWW.EXE | Potentially Bad Traffic | ET POLICY HTTP traffic on port 443 (POST) |
1052 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to *.dyndns. Domain |
1052 | svchost.exe | Misc activity | AV INFO Query to checkip.dyndns. Domain |
988 | CTEAGLES_MBY.EXE | Potential Corporate Privacy Violation | ET POLICY External IP Lookup - checkip.dyndns.org |
988 | CTEAGLES_MBY.EXE | Potential Corporate Privacy Violation | POLICY [PTsecurity] External IP Check checkip.dyndns.org |
988 | CTEAGLES_MBY.EXE | Potentially Bad Traffic | ET POLICY DynDNS CheckIp External IP Address Server Response |
Process | Message |
|---|---|
CTEagles_MBY.exe | C:\Users\admin\AppData\Local\Temp\CTEAGLES_MBY.EXE |
CTEagles_MBY.exe | C:\Users\admin\AppData\Local\Temp\WVDEVIWW.EXE |