analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Сверка 20.03.2019.gz

Full analysis: https://app.any.run/tasks/d998880c-6ae4-4f67-aa2d-be1f20d5fd84
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: March 21, 2019, 11:37:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
redaman
Indicators:
MIME: application/gzip
File info: gzip compressed data, was "\321\342\345\360\352\340 20.03.2019.exe", last modified: Tue Mar 19 21:03:23 2019, max speed, from FAT filesystem (MS-DOS, OS/2, NT)
MD5:

AD23FA9AEA14EC8B3D031F909F9E1AD5

SHA1:

C09B6ABC272A8C0486E347DC9E3FDEAD4B26705D

SHA256:

CA0C345C2DB20E09BF93782787A4F3065EADDD0440E8E9F5E24DCD5CAFF2D8AF

SSDEEP:

6144:AN3CJY6QsctcUWFHLaEH7nkSPHYc+aM/UIBuViq3tnbDaiPaRIk4w5065Y8O43b:ABJ6zc2LFHL/wAYc+HuViqdnbDaiPWpr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Ñâåðêà 20.03.2019.exe (PID: 2080)
    • Loads dropped or rewritten executable

      • Ñâåðêà 20.03.2019.exe (PID: 2080)
      • rundll32.exe (PID: 1760)
    • Loads the Task Scheduler COM API

      • Ñâåðêà 20.03.2019.exe (PID: 2080)
    • REDAMAN was detected

      • rundll32.exe (PID: 1760)
  • SUSPICIOUS

    • Connects to unusual port

      • rundll32.exe (PID: 1760)
    • Executable content was dropped or overwritten

      • Ñâåðêà 20.03.2019.exe (PID: 2080)
      • WinRAR.exe (PID: 428)
    • Creates files in the program directory

      • Ñâåðêà 20.03.2019.exe (PID: 2080)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.z/gz/gzip | GZipped data (100)

EXIF

ZIP

Compression: Deflated
Flags: FileName
ModifyDate: 2019:03:19 22:03:23+01:00
ExtraFlags: Fastest Algorithm
OperatingSystem: FAT filesystem (MS-DOS, OS/2, NT/Win32)
ArchivedFileName: ?????? 20.03.2019.exe
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start winrar.exe winrar.exe no specs ñâåðêà 20.03.2019.exe #REDAMAN rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
428"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Сверка 20.03.2019.gz.z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
1964"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Сверка 20.03.2019.gz.z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2080"C:\Users\admin\AppData\Local\Temp\Rar$EXa428.26360\Ñâåðêà 20.03.2019.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa428.26360\Ñâåðêà 20.03.2019.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
1760rundll32.exe "C:\ProgramData\2401bf603c90\2702bc633f93.dat",DllGetClassObject rootC:\Windows\system32\rundll32.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
768
Read events
745
Write events
23
Delete events
0

Modification events

(PID) Process:(428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(428) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:Key:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:Key:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Сверка 20.03.2019.gz.z
(PID) Process:(428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(428) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
3
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1760rundll32.exeC:\Users\admin\AppData\Local\Temp\B702.tmp
MD5:
SHA256:
1760rundll32.exeC:\Users\admin\AppData\Local\Temp\khpcnhjfnmpdnbem
MD5:
SHA256:
1760rundll32.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa428.26360\Ñâåðêà 20.03.2019.exe
MD5:
SHA256:
1760rundll32.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa428.26360\nomhamhlbgapfipo
MD5:
SHA256:
428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa428.26360\Ñâåðêà 20.03.2019.exeexecutable
MD5:00C6E8E05A3BF9A1A84F9092DD5E15CC
SHA256:EB8035345CE22D91AA9A0C72D59D52AF8F750758DFCB1924F160585F4541E95C
2080Ñâåðêà 20.03.2019.exeC:\ProgramData\2401bf603c90\2702bc633f93.datexecutable
MD5:34496B29C41AABF7CCDF431F9ED88530
SHA256:82B27FCE56AA519C15B7FE954D7A3B8F155DEC692B4378934C1F72451F726C22
2080Ñâåðêà 20.03.2019.exeC:\Users\admin\AppData\Local\Temp\B702.tmpexecutable
MD5:34496B29C41AABF7CCDF431F9ED88530
SHA256:82B27FCE56AA519C15B7FE954D7A3B8F155DEC692B4378934C1F72451F726C22
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1760
rundll32.exe
GET
200
178.62.9.171:80
http://myip.ru/index_small.php
GB
html
317 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1760
rundll32.exe
172.105.198.191:9100
US
suspicious
1760
rundll32.exe
178.62.9.171:80
myip.ru
Digital Ocean, Inc.
GB
malicious

DNS requests

Domain
IP
Reputation
myip.ru
  • 178.62.9.171
unknown
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
1760
rundll32.exe
Potential Corporate Privacy Violation
ET POLICY myip.ru IP lookup
1760
rundll32.exe
A Network Trojan was detected
ET TROJAN [PTsecurity] Win32/Spy.RTM/Redaman IP Check
1760
rundll32.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Spy.RTM.N (Redaman) IP Check
No debug info