| File name: | SaMarinDa Free (V3-VPS) (1).zip |
| Full analysis: | https://app.any.run/tasks/ce20ec04-75d4-49aa-9f9f-1aa2a585371d |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | April 29, 2024, 10:23:56 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract, compression method=store |
| MD5: | 4A1FB389DE318C7EE4FEC0F8498450A0 |
| SHA1: | F61E20994ECCCFDF0C636F6D33F847B3227E41B0 |
| SHA256: | D5B7CAE94E6E84C39D8706B8CDA7195912EF203503F25411729D739734EF9F04 |
| SSDEEP: | 768:U3A58jP9V4+zz1+xkn4eWj/vMhvmgiY90:eA69S+zzwmiMhvmC90 |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2024:04:20 16:49:00 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | SaMarinDa Free (V3-VPS)/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 328 | "C:\Users\admin\Desktop\SaMarinDa Free (V3-VPS)\LoaderSMD.exe" | C:\Users\admin\Desktop\SaMarinDa Free (V3-VPS)\LoaderSMD.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 588 | C:\Windows\system32\cmd.exe /c wmic bios get serialnumber >> C:\Users\admin\AppData\Local\Temp\s15c.0 | C:\Windows\System32\cmd.exe | — | TokenSMD.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 848 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1540 --field-trial-handle=1140,i,6869854326115857340,18364732624464005570,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Version: 109.0.5414.120 Modules
| |||||||||||||||
| 960 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=1336 --field-trial-handle=1140,i,6869854326115857340,18364732624464005570,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | chrome.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 109.0.5414.120 Modules
| |||||||||||||||
| 1024 | "C:\Users\admin\Desktop\SaMarinDa Free (V3-VPS)\LoaderSMD.exe" | C:\Users\admin\Desktop\SaMarinDa Free (V3-VPS)\LoaderSMD.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 1132 | C:\Windows\system32\cmd.exe /c wmic cpu get processorid >> C:\Users\admin\AppData\Local\Temp\s15c.1 | C:\Windows\System32\cmd.exe | — | TokenSMD.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1488 | "C:\Users\admin\AppData\Local\Temp\SMD\TokenSMD.exe" | C:\Users\admin\AppData\Local\Temp\SMD\TokenSMD.exe | LoaderSMD.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 1612 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1088 --field-trial-handle=1140,i,6869854326115857340,18364732624464005570,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 1664 | wmic bios get serialnumber | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1788 | wmic diskdrive get serialnumber | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3984) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (3984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\SaMarinDa Free (V3-VPS) (1).zip | |||
| (PID) Process: | (3984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3984) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1488 | TokenSMD.exe | C:\Users\admin\AppData\Local\Temp\smd.mnth | — | |
MD5:— | SHA256:— | |||
| 2520 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF10bd95.TMP | — | |
MD5:— | SHA256:— | |||
| 328 | LoaderSMD.exe | C:\Users\admin\AppData\Local\Temp\SMD\TokenSMD.mentah | executable | |
MD5:7AEB908F3B1D077A855BD65114333B58 | SHA256:F0EF0A03BA6444A8B0C3BE3352887B67B453F3CF84A277C729C064E760EEF384 | |||
| 588 | cmd.exe | C:\Users\admin\AppData\Local\Temp\s15c.0 | text | |
MD5:9025468F85256136F923096B01375964 | SHA256:D5418014FA8E6E17D8992FD12C0DFECAC8A34855603EA58133E87EA09C2130DF | |||
| 1488 | TokenSMD.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:4EAA0800260DF59FCF95C10371D0AC57 | SHA256:26FF7372CF60F991E69390DABCC8242229E8F40F76732CFD6DBAFADCE6B4700E | |||
| 2520 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 1132 | cmd.exe | C:\Users\admin\AppData\Local\Temp\s15c.1 | text | |
MD5:32EF13E6C24998526C128CD76EB6AA21 | SHA256:7562BA2F99E026E13DE3EEC64A25EA42EB5356F94BDA938C613B152560A3591F | |||
| 3984 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa3984.6194\SaMarinDa Free (V3-VPS)\LoaderSMD.exe | executable | |
MD5:C2027FDA2FB478230E2E65CCC47E54CD | SHA256:D46A03007680E994E2C83008C55A90907B9A2F88E13B9B86A4F0585284CD0F92 | |||
| 1488 | TokenSMD.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\status1[1].htm | binary | |
MD5:7215EE9C7D9DC229D2921A40E899EC5F | SHA256:36A9E7F1C95B82FFB99743E0C5C4CE95D83C9A430AAC59F84EF3CBFAB6145068 | |||
| 1488 | TokenSMD.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA | binary | |
MD5:E8CC5555F13CDB066736486320A37D25 | SHA256:6ED3C6F1C51DEF63D0C3C0741B1DA4034DEAE35F76987EAAE48FB08DB40123F0 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
328 | LoaderSMD.exe | GET | 200 | 103.187.146.29:80 | http://103.187.146.29/samarinda/InjekKey.mentah | unknown | — | — | unknown |
1488 | TokenSMD.exe | GET | 200 | 103.187.146.29:80 | http://103.187.146.29/samarinda/FileKey.mentah | unknown | — | — | unknown |
1488 | TokenSMD.exe | GET | 301 | 188.114.96.3:80 | http://generatetoken.my.id/samarinda/Api/status1.php?e=58EC68DEEA78D0CA775A96491CA85B40&k=SMD | unknown | — | — | unknown |
1488 | TokenSMD.exe | GET | 200 | 216.58.206.67:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | unknown | — | — | unknown |
1488 | TokenSMD.exe | GET | 200 | 216.58.206.67:80 | http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D | unknown | — | — | unknown |
1488 | TokenSMD.exe | GET | 304 | 104.85.249.155:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?20b9ad6b0f68bcbb | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1088 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
328 | LoaderSMD.exe | 103.187.146.29:80 | — | Cloud Host Pte Ltd | ID | unknown |
1488 | TokenSMD.exe | 103.187.146.29:80 | — | Cloud Host Pte Ltd | ID | unknown |
1488 | TokenSMD.exe | 188.114.96.3:80 | generatetoken.my.id | CLOUDFLARENET | NL | unknown |
1488 | TokenSMD.exe | 188.114.96.3:443 | generatetoken.my.id | CLOUDFLARENET | NL | unknown |
1488 | TokenSMD.exe | 104.85.249.155:80 | ctldl.windowsupdate.com | Akamai International B.V. | PL | unknown |
1488 | TokenSMD.exe | 216.58.206.67:80 | ocsp.pki.goog | GOOGLE | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
generatetoken.my.id |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
clientservices.googleapis.com |
| whitelisted |
accounts.google.com |
| shared |
www.google.com |
| whitelisted |
www.gstatic.com |
| whitelisted |
apis.google.com |
| whitelisted |
update.googleapis.com |
| unknown |
www.samarindacheat.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
— | — | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
— | — | Misc activity | ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) |
— | — | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1488 | TokenSMD.exe | Potentially Bad Traffic | ET HUNTING Hiloti Style GET to PHP with invalid terse MSIE headers |
960 | chrome.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 54 |