File name:

OpenBullet crack.rar

Full analysis: https://app.any.run/tasks/aefc30b8-f11e-4bfe-87b8-a84a73cb8063
Verdict: Malicious activity
Threats:

NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website.

Analysis date: May 08, 2020, 14:17:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
nanocore
trojan
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

6CCE0C3B1262584D671BE0B35692F31D

SHA1:

341AC607CB8B2744153DFE49606451B4916CECA7

SHA256:

BF846037508389388C4AE0A0708D4BBAE8791B59EA0C98735657D3460097A12E

SSDEEP:

49152:K6sXBFDqc8gweQAeBD9EosxIr9h0Am2Fu3qcm:POBIcwe+BJEosOHjms

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe (PID: 3632)
    • Changes the autorun value in the registry

      • Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe (PID: 3632)
    • Connects to CnC server

      • Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe (PID: 3632)
    • NANOCORE was detected

      • Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe (PID: 3632)
  • SUSPICIOUS

    • Creates files in the user directory

      • Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe (PID: 3632)
    • Executable content was dropped or overwritten

      • Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe (PID: 3632)
      • WinRAR.exe (PID: 1432)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winrar.exe #NANOCORE openbullet 1.2.1.1 crack by d3vilworks.exe

Process information

PID
CMD
Path
Indicators
Parent process
1432"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\OpenBullet crack.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3632"C:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb1432.28111\openbullet crack\openbullet 1.2.1.1 crack by d3vilworks.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
475
Read events
458
Write events
17
Delete events
0

Modification events

(PID) Process:(1432) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1432) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1432) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1432) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12D\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(1432) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\OpenBullet crack.rar
(PID) Process:(1432) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1432) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1432) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1432) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1432) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12D\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
Executable files
8
Suspicious files
1
Text files
4
Unknown types
6

Dropped files

PID
Process
Filename
Type
1432WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\accounts.txt
MD5:
SHA256:
1432WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\proxy.txt
MD5:
SHA256:
1432WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\Credits.txttext
MD5:
SHA256:
1432WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\MainLoader.dllexecutable
MD5:
SHA256:
1432WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exeexecutable
MD5:
SHA256:
1432WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\fonts\NotoSansBuginese-Regular.ttfttf
MD5:F1165158457F9857F481DC2FF20DFB11
SHA256:87CA7FB3CD61A3DED9E5127F8495DF2A5164E30C5C492A41890E4E8F10F9F3A0
1432WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\defaults\pref\channel-prefs.jstext
MD5:C13B7FFAE99396FDBCBA2F8EB6C90826
SHA256:F2D608EAFCDDEE87986419D5F987490EFCFBE83F53CB300A67BA28085F625E08
1432WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\fonts\NotoSansMyanmar-Regular.ttfodttf
MD5:ED58EE35CE0DDBDE550DDE4EFBBBE411
SHA256:B1AA5081F7963416A6BD56539B5A9AB7E744B6113AAE3BAFA6739EE34A5F844A
1432WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\fonts\NotoSansLao-Regular.ttfttf
MD5:8DEC8EB73F625F21A674B2A20BC6E638
SHA256:933FF321319BD3A02A4C93230C4C02128777D5913F0965401015B947BFA6B861
1432WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1432.28111\OpenBullet crack\FasterDNS.dllexecutable
MD5:BDC8945F1D799C845408522E372D1DBD
SHA256:61E9D5C0727665E9EF3F328141397BE47C65ED11AB621C644B5BBF1D67138403
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
11
Threats
13

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
8.8.8.8:53
Google Inc.
US
malicious
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
176.228.4.23:1604
d3vilmultihack.duckdns.org
Partner Communications Ltd.
IL
malicious
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
8.8.4.4:53
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
d3vilmultihack.duckdns.org
  • 176.228.4.23
malicious

Threats

PID
Process
Class
Message
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
3632
Openbullet 1.2.1.1 CRACK BY D3VILWORKS.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1 ETPRO signatures available at the full report
No debug info