File name: | 1.zip |
Full analysis: | https://app.any.run/tasks/10600e25-6340-484d-92da-54efb81ea2c1 |
Verdict: | Malicious activity |
Threats: | njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world. |
Analysis date: | May 15, 2019, 16:52:51 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v1.0 to extract |
MD5: | 6960EBD053FB5FC2D8792F0145A06A7D |
SHA1: | 53CD23F05518EAF160B8CCBB523E5236C3B75E2B |
SHA256: | F1E61057605A38C6A9BF92F6E6671681E429F83DF050770C172097FE0871EFCC |
SSDEEP: | 3072:R1TenRzQZsOwfO9LZv3AHBN4jA8iV1aQaHPXP1IYW:R0RQ2OjAHv4jAbVKHPuZ |
.zip | | | ZIP compressed archive (100) |
---|
ZipFileName: | Fortnite Slurper Checker/ |
---|---|
ZipUncompressedSize: | - |
ZipCompressedSize: | - |
ZipCRC: | 0x00000000 |
ZipModifyDate: | 2019:05:15 16:58:08 |
ZipCompression: | None |
ZipBitFlag: | - |
ZipRequiredVersion: | 10 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2964 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\1.zip" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
1256 | "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe5_ Global\UsGthrCtrlFltPipeMssGthrPipe5 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\System32\SearchProtocolHost.exe | — | SearchIndexer.exe |
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Exit code: 0 Version: 7.00.7600.16385 (win7_rtm.090713-1255) | ||||
3816 | "C:\Users\admin\Desktop\Fortnite Slurper Checker\FortSlurper.exe" | C:\Users\admin\Desktop\Fortnite Slurper Checker\FortSlurper.exe | explorer.exe | |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
324 | "C:\Users\admin\AppData\Roaming\System_manager.exe" | C:\Users\admin\AppData\Roaming\System_manager.exe | FortSlurper.exe | |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
3968 | netsh firewall add allowedprogram "C:\Users\admin\AppData\Roaming\System_manager.exe" "System_manager.exe" ENABLE | C:\Windows\system32\netsh.exe | — | System_manager.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
4036 | "C:\Users\admin\AppData\Local\Temp\tmp8101.tmp.exe" .. | C:\Users\admin\AppData\Local\Temp\tmp8101.tmp.exe | System_manager.exe | |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
676 | netsh firewall delete allowedprogram "C:\Users\admin\AppData\Roaming\System_manager.exe" | C:\Windows\system32\netsh.exe | — | System_manager.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2404 | cmd.exe /c ping 0 -n 2 & del "C:\Users\admin\AppData\Roaming\System_manager.exe" | C:\Windows\system32\cmd.exe | — | System_manager.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2668 | ping 0 -n 2 | C:\Windows\system32\PING.EXE | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3068 | "C:\Users\admin\AppData\Roaming\System_manager.exe" | C:\Users\admin\AppData\Roaming\System_manager.exe | tmp8101.tmp.exe | |
User: admin Integrity Level: HIGH |
(PID) Process: | (2964) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtBMP |
Value: | |||
(PID) Process: | (2964) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
Operation: | write | Name: | ShellExtIcon |
Value: | |||
(PID) Process: | (2964) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (2964) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\1.zip | |||
(PID) Process: | (2964) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (2964) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (2964) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (2964) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (3816) FortSlurper.exe | Key: | HKEY_CURRENT_USER |
Operation: | write | Name: | di |
Value: ! | |||
(PID) Process: | (3816) FortSlurper.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
324 | System_manager.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6069c10fb03a92473633134bb7e91c38.exe | executable | |
MD5:C6682DDCE7D11373FC0654CE6A29CA51 | SHA256:31DEEBDEDB7F917AA30EFB6CF8F12F48DBE34DE07896DCAD874FBA29CCE48A19 | |||
4036 | tmp8101.tmp.exe | C:\Users\admin\AppData\Roaming\System_manager.exe | executable | |
MD5:6FF7BC5D33BB6118D9EB664C303EB604 | SHA256:499A8F81BDC69B31A86D1606796E872DD6BABE0242A7900F67AB50451F05EF85 | |||
3068 | System_manager.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\19e0e82edf35be9fb14741ee8dfb00a8.exe | executable | |
MD5:6FF7BC5D33BB6118D9EB664C303EB604 | SHA256:499A8F81BDC69B31A86D1606796E872DD6BABE0242A7900F67AB50451F05EF85 | |||
324 | System_manager.exe | C:\Users\admin\AppData\Local\Temp\tmp8101.tmp.exe | executable | |
MD5:6FF7BC5D33BB6118D9EB664C303EB604 | SHA256:499A8F81BDC69B31A86D1606796E872DD6BABE0242A7900F67AB50451F05EF85 | |||
3816 | FortSlurper.exe | C:\Users\admin\AppData\Roaming\System_manager.exe | executable | |
MD5:C6682DDCE7D11373FC0654CE6A29CA51 | SHA256:31DEEBDEDB7F917AA30EFB6CF8F12F48DBE34DE07896DCAD874FBA29CCE48A19 | |||
2964 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2964.19657\Fortnite Slurper Checker\FortSlurper.exe | executable | |
MD5:C6682DDCE7D11373FC0654CE6A29CA51 | SHA256:31DEEBDEDB7F917AA30EFB6CF8F12F48DBE34DE07896DCAD874FBA29CCE48A19 | |||
2964 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2964.19657\Fortnite Slurper Checker\xNet.dll | executable | |
MD5:AC1DCEDDBC66A1AB7915AC9931F0CFEC | SHA256:CC949931EF9533ADCED83F3D58862E9732E5DB7AD17B5FD4CB9D209A99EDB592 | |||
2964 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa2964.19657\Fortnite Slurper Checker\Bunifu_UI_v1.5.3.dll | executable | |
MD5:2ECB51AB00C5F340380ECF849291DBCF | SHA256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
324 | System_manager.exe | 197.25.152.77:1177 | forupload.ddns.net | Tunisia BackBone AS | TN | malicious |
3068 | System_manager.exe | 197.25.152.77:1177 | forupload.ddns.net | Tunisia BackBone AS | TN | malicious |
Domain | IP | Reputation |
---|---|---|
forupload.ddns.net |
| malicious |
linkobenz.ddns.net |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
324 | System_manager.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
324 | System_manager.exe | A Network Trojan was detected | ET TROJAN Bladabindi/njRAT CnC Command (ll) |
3068 | System_manager.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
3068 | System_manager.exe | A Network Trojan was detected | ET TROJAN Bladabindi/njRAT CnC Command (ll) |
3068 | System_manager.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
3068 | System_manager.exe | A Network Trojan was detected | ET TROJAN Bladabindi/njRAT CnC Command (ll) |
3068 | System_manager.exe | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
3068 | System_manager.exe | A Network Trojan was detected | ET TROJAN Bladabindi/njRAT CnC Command (ll) |
3068 | System_manager.exe | A Network Trojan was detected | ET TROJAN njrat ver 0.7d Malware CnC Callback (Capture) |
3068 | System_manager.exe | A Network Trojan was detected | ET TROJAN njrat ver 0.7d Malware CnC Callback (Remote Desktop) |