URL:

https://187.58.56.26:449

Full analysis: https://app.any.run/tasks/2cba9a53-64be-4aef-b681-a8b93e0d4b35
Verdict: Malicious activity
Threats:

TrickBot is an advanced banking trojan that attackers can use to steal payment credentials from the victims. It can redirect the victim to a fake banking cabinet and retrieve credentials typed in on the webpage.

Analysis date: July 17, 2019, 14:58:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
trickbot
MD5:

949E62C6DF6F2B5037AA0CB8D756C787

SHA1:

42BC2D6FF5D65E8FD03A37B4A94A49F1FD752322

SHA256:

DF5748490B1ED308593B0541D429D32BF133C2530E9A7DCB971A448FC43A42AA

SSDEEP:

3:N82P:22P

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • TRICKBOT was detected

      • opera.exe (PID: 2628)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • opera.exe (PID: 2628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #TRICKBOT opera.exe

Process information

PID
CMD
Path
Indicators
Parent process
2628"C:\Program Files\Opera\opera.exe" "https://187.58.56.26:449"C:\Program Files\Opera\opera.exe
explorer.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Internet Browser
Exit code:
0
Version:
1748
Modules
Images
c:\program files\opera\opera.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\rpcrt4.dll
Total events
244
Read events
184
Write events
60
Delete events
0

Modification events

(PID) Process:(2628) opera.exeKey:HKEY_CURRENT_USER\Software\Opera Software
Operation:writeName:Last CommandLine v2
Value:
C:\Program Files\Opera\opera.exe "https://187.58.56.26:449"
(PID) Process:(2628) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
0
Suspicious files
23
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
2628opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\oprD8CC.tmp
MD5:
SHA256:
2628opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\oprD8DC.tmp
MD5:
SHA256:
2628opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\oprD91C.tmp
MD5:
SHA256:
2628opera.exeC:\Users\admin\AppData\Local\Opera\Opera\cache\sesn\opr00001.tmp
MD5:
SHA256:
2628opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TZULEJ1SG7N1GPX6SNI5.temp
MD5:
SHA256:
2628opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opr7752.tmp
MD5:
SHA256:
2628opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\operaprefs.initext
MD5:
SHA256:
2628opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opssl6.datbinary
MD5:
SHA256:
2628opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\vlink4.datbinary
MD5:
SHA256:
2628opera.exeC:\Users\admin\AppData\Local\Opera\Opera\cache\CACHEDIR.TAGtext
MD5:E717F92FA29AE97DBE4F6F5C04B7A3D9
SHA256:5BBD5DCBF87FD8CD7544C522BADF22A2951CF010AD9F25C40F9726F09EA2B552
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
6
DNS requests
5
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2628
opera.exe
GET
200
93.184.220.29:80
http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl
US
der
528 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2628
opera.exe
187.58.56.26:449
TELEFÔNICA BRASIL S.A
BR
malicious
2628
opera.exe
185.26.182.93:443
sitecheck2.opera.com
Opera Software AS
whitelisted
2628
opera.exe
185.26.182.94:443
sitecheck2.opera.com
Opera Software AS
whitelisted
2628
opera.exe
93.184.220.29:80
crl4.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
sitecheck2.opera.com
  • 185.26.182.93
  • 185.26.182.94
  • 185.26.182.111
  • 185.26.182.112
whitelisted
certs.opera.com
  • 185.26.182.94
  • 185.26.182.93
whitelisted
crl4.digicert.com
  • 93.184.220.29
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
2628
opera.exe
Not Suspicious Traffic
ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O)
1 ETPRO signatures available at the full report
No debug info