| download: | Deezer+Brute+And+Checker.rar |
| Full analysis: | https://app.any.run/tasks/a56f698c-4515-43bf-b62e-99d55431dfb8 |
| Verdict: | Malicious activity |
| Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
| Analysis date: | February 18, 2019, 15:44:58 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/html |
| File info: | HTML document, UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators |
| MD5: | 2FBDE6745C0A87A9F16E2472896794C3 |
| SHA1: | 81F178074309B2D2696387D32B05FE3D94B81957 |
| SHA256: | DCA851D14A8AE50F3CAE1D37A31C6A3C8F13A70A8730D4F2804B9FB9401F3111 |
| SSDEEP: | 3072:k1NgAkHnj9Q6KSeX3w7EWhxu9tSEOLhDL4MfY:MgAkHnj9QBSeXg749tSDx2 |
| .html | | | HyperText Markup Language (100) |
|---|
| twitterCard: | summary_large_image |
|---|---|
| twitterSite: | @MediaFire |
| twitterUrl: | http://www.mediafire.com/file/9ycp1pgflscyc23/Deezer_Brute_And_Checker.rar/file |
| twitterTitle: | Deezer Brute And Checker |
| twitterImage: | //static.mediafire.com/images/filetype/download/zip.jpg |
| twitterDescription: | - |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 336 | "C:\Users\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\taskhost.exe" | C:\Users\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\taskhost.exe | TempSetup.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Tasks Exit code: 0 Version: 8.1.1.7800 Modules
| |||||||||||||||
| 756 | "C:\Users\admin\AppData\Local\TempSetup.exe" | C:\Users\admin\AppData\Local\TempSetup.exe | DeBrute_ShaOnKrisTof.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Tasks Exit code: 0 Version: 8.1.1.7800 Modules
| |||||||||||||||
| 936 | "C:\Users\admin\AppData\Roaming\Microsoft Corporation\Microsoft® Windows® Operating System\8.1.1.7800\svchost.exe" | C:\Users\admin\AppData\Roaming\Microsoft Corporation\Microsoft® Windows® Operating System\8.1.1.7800\svchost.exe | taskhost.exe | ||||||||||||
User: admin Company: Intel Corporation Integrity Level: MEDIUM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1128 | "C:\Users\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\explorer.exe" | C:\Users\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\explorer.exe | explorer.exe | ||||||||||||
User: admin Company: Intel Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 Modules
| |||||||||||||||
| 1240 | netsh firewall add allowedprogram "C:\Users\admin\AppData\Roaming\explorer.exe" "explorer.exe" ENABLE | C:\Windows\system32\netsh.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1376 | "C:\Users\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\taskhost.exe" | C:\Users\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\taskhost.exe | TempSetup.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Host Process for Windows Tasks Exit code: 0 Version: 8.1.1.7800 Modules
| |||||||||||||||
| 1384 | "C:\Users\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\taskhost.exe" | C:\Users\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\taskhost.exe | TempSetup.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Tasks Exit code: 0 Version: 8.1.1.7800 Modules
| |||||||||||||||
| 1520 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1008,10943740888169369047,3949466770422008629,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=77D25A4A968C644AC1D450C78F368528 --mojo-platform-channel-handle=1016 --ignored=" --type=renderer " /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 68.0.3440.106 Modules
| |||||||||||||||
| 2124 | "C:\Users\admin\AppData\Local\TempSetup.exe" | C:\Users\admin\AppData\Local\TempSetup.exe | — | DeBrute_ShaOnKrisTof.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Host Process for Windows Tasks Exit code: 0 Version: 8.1.1.7800 Modules
| |||||||||||||||
| 2228 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1008,10943740888169369047,3949466770422008629,131072 --enable-features=PasswordImport --disable-gpu-compositing --service-pipe-token=ED611340A3B95B04E7986F84C9240268 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=ED611340A3B95B04E7986F84C9240268 --renderer-client-id=7 --mojo-platform-channel-handle=3700 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 68.0.3440.106 Modules
| |||||||||||||||
| (PID) Process: | (2972) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2972) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2972) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2972) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\General |
| Operation: | write | Name: | LastFolder |
Value: C:\Users\admin\AppData\Local\Temp | |||
| (PID) Process: | (2972) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2972) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2972) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2972) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2972) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\General\Toolbar\Layout |
| Operation: | write | Name: | Band56_0 |
Value: 38000000730100000402000000000000D4D0C800000000000000000000000000860102000000000039000000B40200000000000001000000 | |||
| (PID) Process: | (2972) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\General\Toolbar\Layout |
| Operation: | write | Name: | Band56_1 |
Value: 38000000730100000500000000000000D4D0C8000000000000000000000000008801030000000000160000002A0000000000000002000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2892 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\6a05961f-a2b4-41e0-bb8a-a571ded80307.tmp | — | |
MD5:— | SHA256:— | |||
| 2892 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\000016.dbtmp | — | |
MD5:— | SHA256:— | |||
| 2892 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000016.dbtmp | — | |
MD5:— | SHA256:— | |||
| 2892 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\f5a385df-a81f-4ac3-a78e-da4b44ee22b2.tmp | — | |
MD5:— | SHA256:— | |||
| 2892 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2892 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\e6622492fa163609ddd4212f54512baa07929ed3\caecb3bd-7969-4305-84d6-3a376453ec73\index-dir\temp-index | — | |
MD5:— | SHA256:— | |||
| 2892 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Version | text | |
MD5:— | SHA256:— | |||
| 2892 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF2513e1.TMP | text | |
MD5:— | SHA256:— | |||
| 2892 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2892 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF251410.TMP | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2892 | chrome.exe | GET | 200 | 216.58.206.1:80 | http://2.bp.blogspot.com/-w-vkQxuHx7c/XA1Un7WPhCI/AAAAAAAAAM0/MdyhLEvZkhA0KNci84isvvl99jhC6V_JwCK4BGAYYCw/s72-c/1-703510.jpg | US | image | 1.76 Kb | whitelisted |
2892 | chrome.exe | GET | 200 | 216.58.206.1:80 | http://3.bp.blogspot.com/-aSA3HQL7SnE/XA1UfM9f9-I/AAAAAAAAAMY/c9p8hNrjmWQjDc-H8vQtRfkLViFOFmE0gCK4BGAYYCw/s72-c/6-768124.jpg | US | image | 1.74 Kb | whitelisted |
2892 | chrome.exe | GET | 304 | 216.58.207.33:80 | http://hack-crack9.blogspot.com/ | US | compressed | 35.9 Kb | whitelisted |
2892 | chrome.exe | GET | 200 | 216.58.206.1:80 | http://1.bp.blogspot.com/-1SixxkJVpCA/XA1UfvEry6I/AAAAAAAAAMg/tagaxZaCYE0ViyfoTvaOe-BTBjCfwMsNwCK4BGAYYCw/s72-c/5-769964.jpg | US | image | 2.56 Kb | whitelisted |
2892 | chrome.exe | GET | 200 | 216.58.206.1:80 | http://2.bp.blogspot.com/-VnjikBidG-U/XA1UXFY-n-I/AAAAAAAAAMI/IMuC8L7-FQA4-qgR0omZSzghugSufdDTQCK4BGAYYCw/s72-c/2-736642.jpg | US | image | 1.04 Kb | whitelisted |
2892 | chrome.exe | GET | 200 | 216.58.206.1:80 | http://4.bp.blogspot.com/-7RYVKrAx57A/XA1Ui4BNqgI/AAAAAAAAAMo/NjBRK_fBmzcOoohw0R53sbvEk8zmodi9wCK4BGAYYCw/s72-c/8-783783.jpg | US | image | 2.76 Kb | whitelisted |
2892 | chrome.exe | GET | 200 | 216.58.206.1:80 | http://1.bp.blogspot.com/-yH_5izewSJM/XA1UzXpUXKI/AAAAAAAAANQ/aoE1x6GLFWkQDJolPE4J7P4yNFr11jSjgCK4BGAYYCw/s72-c/7-749642.jpg | US | image | 3.76 Kb | whitelisted |
2892 | chrome.exe | GET | 200 | 216.58.206.1:80 | http://2.bp.blogspot.com/-tAL9Ahh2xSI/XA1UZD8qOhI/AAAAAAAAAMQ/TS6f5dgIX-wLuAYRgt1NGbtcWG-43fjuwCK4BGAYYCw/s72-c/3-744439.jpg | US | image | 1.82 Kb | whitelisted |
2892 | chrome.exe | GET | 200 | 148.251.13.139:80 | http://ad.a-ads.com/825498?size=300x250 | DE | html | 1.92 Kb | whitelisted |
2892 | chrome.exe | GET | 200 | 216.58.206.1:80 | http://2.bp.blogspot.com/-TTaAqGfZLUk/XA1UtYIldCI/AAAAAAAAANA/t0rXYwF7YMM8D-0kY3fvtMiwrxZ6ASpDgCK4BGAYYCw/s72-c/4-725292.jpg | US | image | 892 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2892 | chrome.exe | 172.217.22.67:443 | www.gstatic.com | Google Inc. | US | whitelisted |
2892 | chrome.exe | 172.217.16.195:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
2892 | chrome.exe | 172.217.16.131:443 | www.google.de | Google Inc. | US | whitelisted |
2892 | chrome.exe | 172.217.18.10:443 | fonts.googleapis.com | Google Inc. | US | whitelisted |
2892 | chrome.exe | 172.217.23.164:443 | www.google.com | Google Inc. | US | whitelisted |
2892 | chrome.exe | 216.58.207.33:80 | hack-crack9.blogspot.com | Google Inc. | US | whitelisted |
2892 | chrome.exe | 209.197.3.15:80 | maxcdn.bootstrapcdn.com | Highwinds Network Group, Inc. | US | whitelisted |
2892 | chrome.exe | 216.58.206.13:443 | accounts.google.com | Google Inc. | US | whitelisted |
2892 | chrome.exe | 172.217.16.201:443 | www.blogger.com | Google Inc. | US | whitelisted |
2892 | chrome.exe | 172.217.21.202:443 | ajax.googleapis.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
www.gstatic.com |
| whitelisted |
www.google.de |
| whitelisted |
clientservices.googleapis.com |
| whitelisted |
safebrowsing.googleapis.com |
| whitelisted |
accounts.google.com |
| shared |
ssl.gstatic.com |
| whitelisted |
apis.google.com |
| whitelisted |
www.google.com |
| malicious |
www.google.fr |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2892 | chrome.exe | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |
2892 | chrome.exe | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |
2480 | svchost.exe | A Network Trojan was detected | MALWARE [PTsecurity] Trojan.DownLoader22.55152 (Backdoor.Bladabindi/Variant) |
3876 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
3876 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
3876 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
3876 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |