File name:

Nuclear RAT 2.1.0.rar

Full analysis: https://app.any.run/tasks/d9741710-a0d8-4480-b6d8-f22297c74b74
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: September 10, 2020, 21:44:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
keylogger
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

70285CB6E46EEA1C9551D727CC8F562B

SHA1:

2397F4B6FA479016C85BE9AB7A7187EC2F87DB52

SHA256:

F7A2D5DF78DD87B35F91156E9B2969DB79D260A21C27F235A94B91EE6E849632

SSDEEP:

24576:eLUHQJm7UcDZVAdfTnH4lzRSU3pWJkYl7A4ap:iWQUoc7Oc9RL5YkGEz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • client.exe (PID: 1796)
      • srtj.exe (PID: 2456)
      • srtj.exe (PID: 3704)
  • SUSPICIOUS

    • Writes files like Keylogger logs

      • WinRAR.exe (PID: 2632)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2632)
      • client.exe (PID: 1796)
  • INFO

    • Manual execution by user

      • client.exe (PID: 1796)
      • srtj.exe (PID: 3704)
      • srtj.exe (PID: 2456)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

CompressedSize: 1442
UncompressedSize: 3135
OperatingSystem: Win32
ModifyDate: 2007:09:04 19:40:08
PackingMethod: Normal
ArchivedFileName: Nuclear RAT 2.1.0\change.php
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe client.exe notepad.exe no specs srtj.exe no specs srtj.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1796"C:\Users\admin\Desktop\Nuclear RAT 2.1.0\client.exe" C:\Users\admin\Desktop\Nuclear RAT 2.1.0\client.exe
explorer.exe
User:
admin
Company:
Nuclear Winter Crew
Integrity Level:
MEDIUM
Description:
Nuclear RAT 2.1.0
Exit code:
0
Version:
2.1.0.0
Modules
Images
c:\users\admin\desktop\nuclear rat 2.1.0\client.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
2456"C:\Users\admin\Desktop\srtj.exe" C:\Users\admin\Desktop\srtj.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\srtj.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2480"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Nuclear RAT 2.1.0\Readme.txtC:\Windows\system32\NOTEPAD.EXEclient.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2632"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Nuclear RAT 2.1.0.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3704"C:\Users\admin\Desktop\srtj.exe" C:\Users\admin\Desktop\srtj.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\srtj.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
1 037
Read events
950
Write events
85
Delete events
2

Modification events

(PID) Process:(2632) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2632) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2632) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2632) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Nuclear RAT 2.1.0.rar
(PID) Process:(2632) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2632) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2632) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2632) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2632) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E
Operation:writeName:@C:\Windows\system32\notepad.exe,-469
Value:
Text Document
(PID) Process:(2632) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
3
Suspicious files
0
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2632.13493\Nuclear RAT 2.1.0\client.dklangtext
MD5:
SHA256:
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2632.13493\Nuclear RAT 2.1.0\change.phptext
MD5:
SHA256:
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2632.13493\Nuclear RAT 2.1.0\changelog.txttext
MD5:
SHA256:
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2632.13493\Nuclear RAT 2.1.0\logger.phptext
MD5:
SHA256:
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2632.13493\Nuclear RAT 2.1.0\Readme.txttext
MD5:
SHA256:
1796client.exeC:\Users\admin\Desktop\srtj.exeexecutable
MD5:
SHA256:
2632WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2632.13493\Nuclear RAT 2.1.0\client.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info