File name:

ConsoleSniffer -PS3-PS4 Sniffer v3.rar

Full analysis: https://app.any.run/tasks/f0e4b8ae-e0ff-4ef3-bad1-b94f605bc227
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: June 11, 2018, 05:23:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
njrat
bladabindi
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

2EFBBAC2CFFD687EFF29FC444844D29B

SHA1:

E792D7C7157DF1A4C7E78A274C6107E8A0E5A18E

SHA256:

C23242C58BF95AF779498036796D8CB7B59EF34469F1A55DCC1BDDE08BAB8914

SSDEEP:

98304:5ssZUZQ8/zHYk/8YWgHTvkYJrgjhqilQVpsec7XBritM:5ss/+z4avzMY+jzlWpGjBrT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • ConsoleSniffer installer‮exe..exe (PID: 3976)
      • ConsoleSniffer installer‮exe..exe (PID: 1476)
      • LocalFAjjjYklYm.exe (PID: 788)
      • Server.exe (PID: 3944)
      • system.exe (PID: 2524)
      • LocalTngsvKorVr..exe (PID: 3020)
      • ConsoleSniffer.exe (PID: 2032)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 2192)
    • Writes to a start menu file

      • system.exe (PID: 2524)
    • Changes the autorun value in the registry

      • system.exe (PID: 2524)
    • njRAT was detected

      • system.exe (PID: 2524)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 7zFM.exe (PID: 3760)
      • ConsoleSniffer installer‮exe..exe (PID: 1476)
      • LocalFAjjjYklYm.exe (PID: 788)
      • Server.exe (PID: 3944)
      • system.exe (PID: 2524)
      • LocalTngsvKorVr..exe (PID: 3020)
    • Uses NETSH.EXE for network configuration

      • system.exe (PID: 2524)
    • Creates files in the user directory

      • system.exe (PID: 2524)
      • LocalTngsvKorVr..exe (PID: 3020)
    • Creates a software uninstall entry

      • LocalTngsvKorVr..exe (PID: 3020)
    • Connects to unusual port

      • system.exe (PID: 2524)
    • Creates files in the program directory

      • LocalTngsvKorVr..exe (PID: 3020)
  • INFO

    • Dropped object may contain URL's

      • LocalTngsvKorVr..exe (PID: 3020)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
10
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start 7zfm.exe searchprotocolhost.exe no specs consolesniffer installer‮exe..exe no specs consolesniffer installer‮exe..exe localfajjjyklym.exe localtngsvkorvr..exe server.exe THREAT system.exe netsh.exe no specs consolesniffer.exe

Process information

PID
CMD
Path
Indicators
Parent process
788"C:\Users\admin\AppData\LocalFAjjjYklYm.exe" C:\Users\admin\AppData\LocalFAjjjYklYm.exe
ConsoleSniffer installer‮exe..exe
User:
admin
Integrity Level:
HIGH
Description:
Explorer
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\localfajjjyklym.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
1476"C:\Users\admin\Desktop\ConsoleSniffer installer‮exe..exe" C:\Users\admin\Desktop\ConsoleSniffer installer‮exe..exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\consolesniffer installer‮exe..exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
2032"C:\Program Files\Spy Proof Solutions\Console Sniffer\ConsoleSniffer.exe"C:\Program Files\Spy Proof Solutions\Console Sniffer\ConsoleSniffer.exe
LocalTngsvKorVr..exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
IP Grabber
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\program files\spy proof solutions\console sniffer\consolesniffer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
2192"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\System32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2524"C:\Users\admin\AppData\Local\Temp\system.exe" C:\Users\admin\AppData\Local\Temp\system.exe
Server.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\system.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
2568netsh firewall add allowedprogram "C:\Users\admin\AppData\Local\Temp\system.exe" "system.exe" ENABLEC:\Windows\system32\netsh.exesystem.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
3020"C:\Users\admin\AppData\LocalTngsvKorVr..exe" C:\Users\admin\AppData\LocalTngsvKorVr..exe
ConsoleSniffer installer‮exe..exe
User:
admin
Company:
Spy Proof Solutions
Integrity Level:
HIGH
Description:
Console Sniffer 3.00 Installation
Exit code:
0
Version:
3.00
Modules
Images
c:\users\admin\appdata\localtngsvkorvr..exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3760"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\admin\Downloads\ConsoleSniffer -PS3-PS4 Sniffer v3.rar"C:\Program Files\7-Zip\7zFM.exe
explorer.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip File Manager
Exit code:
0
Version:
16.04
Modules
Images
c:\program files\7-zip\7zfm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3944"C:\Users\admin\Documents\Server.exe" C:\Users\admin\Documents\Server.exe
LocalFAjjjYklYm.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\documents\server.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
3976"C:\Users\admin\Desktop\ConsoleSniffer installer‮exe..exe" C:\Users\admin\Desktop\ConsoleSniffer installer‮exe..exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
3221226540
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\consolesniffer installer‮exe..exe
c:\systemroot\system32\ntdll.dll
Total events
2 182
Read events
1 669
Write events
513
Delete events
0

Modification events

(PID) Process:(2192) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\93\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2192) SearchProtocolHost.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\93\52C64B7E
Operation:writeName:@C:\Windows\System32\msimsg.dll,-34
Value:
Windows Installer Package
(PID) Process:(1476) ConsoleSniffer installer‮exe..exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1476) ConsoleSniffer installer‮exe..exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(788) LocalFAjjjYklYm.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(788) LocalFAjjjYklYm.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3760) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM
Operation:writeName:FolderShortcuts
Value:
(PID) Process:(3760) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM
Operation:writeName:FolderHistory
Value:
43003A005C00550073006500720073005C00610064006D0069006E005C0044006F0077006E006C006F006100640073005C0043006F006E0073006F006C00650053006E006900660066006500720020002D005000530033002D00500053003400200053006E00690066006600650072002000760033002E007200610072005C000000
(PID) Process:(3760) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM
Operation:writeName:PanelPath0
Value:
C:\Users\admin\Downloads\
(PID) Process:(3760) 7zFM.exeKey:HKEY_CURRENT_USER\Software\7-Zip\FM
Operation:writeName:FlatViewArc0
Value:
0
Executable files
22
Suspicious files
1
Text files
8
Unknown types
2

Dropped files

PID
Process
Filename
Type
3020LocalTngsvKorVr..exeC:\Users\admin\AppData\Local\Temp\$inst\temp_0.tmp
MD5:
SHA256:
1476ConsoleSniffer installer‮exe..exeC:\Users\admin\AppData\LocalTngsvKorVr..exeexecutable
MD5:
SHA256:
37607zFM.exeC:\Users\admin\AppData\Local\Temp\7zE0BECEB74\ConsoleSniffer installer‮exe..exeexecutable
MD5:
SHA256:
1476ConsoleSniffer installer‮exe..exeC:\Users\admin\AppData\LocalFAjjjYklYm.exeexecutable
MD5:
SHA256:
3020LocalTngsvKorVr..exeC:\Users\admin\AppData\Local\Temp\$inst\2.tmpcompressed
MD5:
SHA256:
788LocalFAjjjYklYm.exeC:\Users\admin\Documents\Server.exeexecutable
MD5:
SHA256:
37607zFM.exeC:\Users\admin\AppData\Local\Temp\7zE0BECEB74\PcapDotNet.Analysis.dllexecutable
MD5:894D0649D55E0813BF5D0F0FB96F3C99
SHA256:1F4F96A4DCED09133AEE3BD028CC35B5FBD3D642190ABF5611016920CD9CE260
37607zFM.exeC:\Users\admin\AppData\Local\Temp\7zE0BECEB74\wincap\Win10Pcap-v10.2-5002.msiexecutable
MD5:4B68F0C956907999AB9B7DCA9B23FB94
SHA256:CE1169C7CAC4BC9BC45E159CEC069F0AB57C42FC3F636456A2E404CC6B91E855
3020LocalTngsvKorVr..exeC:\Users\admin\AppData\Local\Temp\$inst\4.tmpimage
MD5:47A52AD03C81FD763EB9192D3AEB103E
SHA256:849484F24ED63771C79C46F7FF387AA6AC91A81C9C8D046DB6103E97EC28F902
37607zFM.exeC:\Users\admin\AppData\Local\Temp\7zE0BECEB74\PcapDotNet.Core.Extensions.dllexecutable
MD5:BD02851517BA8A2252AE5F6588E8886E
SHA256:925B370A65D5135D1425027E5087BE62D098D822B9F2CECD840CD7EFA5397380
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
10
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2032
ConsoleSniffer.exe
GET
200
149.56.133.157:80
http://hub.psnprank.com/api/?a=sendmessage&user=Enter%20your%20username&pass=Enter%20your%20password&sniff&id=w6C%2FczPD73DKSrGIOoDwi3vvGAPNc0v%2F&k=FC4ED6AIl2NAox%2BAKLpddoLNKeHwutRPYP3beqSr2r4yPQBX%2FsiP4MvENkw76BCQKQCHJJ4iBBg%3D&version=3&ran=44940
CA
text
41 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2032
ConsoleSniffer.exe
149.56.133.157:80
hub.psnprank.com
OVH SAS
CA
unknown
2524
system.exe
109.67.64.114:1177
palestine48.ddns.net
Bezeq International
IL
unknown

DNS requests

Domain
IP
Reputation
palestine48.ddns.net
  • 109.67.64.114
malicious
teredo.ipv6.microsoft.com
whitelisted
hub.psnprank.com
  • 149.56.133.157
unknown

Threats

No threats detected
No debug info