analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

66490387285fb8e42552c89daf204734

Full analysis: https://app.any.run/tasks/15dc2e2a-86d7-4519-a2db-784df994555a
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: December 14, 2018, 02:28:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
megalodon
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

66490387285FB8E42552C89DAF204734

SHA1:

F82EC8B9E5858F4BC8AC944AE95F31E40EF25A92

SHA256:

FC4032CFD2F170D09B7561976DF2931F7737BF52807CFE721E1D91EE1B323057

SSDEEP:

49152:IEw1wY7SzHqZuXqI7WyFfbnnGiBuLFe392:IEwOY77yN7WyZbGi0Lk392

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • ike_megalodon_packed.exe (PID: 4060)
      • ike_megalodon_packed.exe (PID: 3044)
    • MEGALODON was detected

      • ike_megalodon_packed.exe (PID: 4060)
    • Actions looks like stealing of personal data

      • ike_megalodon_packed.exe (PID: 4060)
  • SUSPICIOUS

    • Application launched itself

      • ike_megalodon_packed.exe (PID: 3044)
    • Connects to SMTP port

      • ike_megalodon_packed.exe (PID: 4060)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2484)
    • Loads DLL from Mozilla Firefox

      • ike_megalodon_packed.exe (PID: 4060)
    • Checks for external IP

      • ike_megalodon_packed.exe (PID: 4060)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2018:12:11 13:38:24
ZipCRC: 0x002378bd
ZipCompressedSize: 212724
ZipUncompressedSize: 362496
ZipFileName: 400000.mem
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe ike_megalodon_packed.exe no specs #MEGALODON ike_megalodon_packed.exe

Process information

PID
CMD
Path
Indicators
Parent process
3676"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\66490387285fb8e42552c89daf204734.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2484"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\66490387285fb8e42552c89daf204734.zip" C:\Users\admin\Desktop\C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3044"C:\Users\admin\Desktop\ike_megalodon_packed.exe" C:\Users\admin\Desktop\ike_megalodon_packed.exeexplorer.exe
User:
admin
Company:
Dot & Media
Integrity Level:
MEDIUM
Description:
A&G
Exit code:
0
Version:
15.3.12.8
4060"C:\Users\admin\Desktop\ike_megalodon_packed.exe"C:\Users\admin\Desktop\ike_megalodon_packed.exe
ike_megalodon_packed.exe
User:
admin
Company:
Dot & Media
Integrity Level:
MEDIUM
Description:
A&G
Version:
15.3.12.8
Total events
416
Read events
379
Write events
0
Delete events
0

Modification events

No data
Executable files
10
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2484WinRAR.exeC:\Users\admin\Desktop\4000000_extract-cleanedexecutable
MD5:E547B7A65B3976278F6978312274740B
SHA256:3848CF97856129B46A5F5110120AE42EFDD5904C1509F79D30A3CC2BD986FC9A
2484WinRAR.exeC:\Users\admin\Desktop\stub_2.binexecutable
MD5:7A99B9521089A319EC86C097D691673C
SHA256:03912569C0DC684C0834B9304C291BAB2848A02CBCC15D6B8A4B369CFF7F57D6
2484WinRAR.exeC:\Users\admin\Desktop\stub_1.binexecutable
MD5:44E88D02FC6D1F84436D390D932234ED
SHA256:D26172A191836109C1054B1441995EB986872296ECFB8CC4836C90F7BF47FA75
2484WinRAR.exeC:\Users\admin\Desktop\stub_4.binexecutable
MD5:21B2ED5EEF83B6E163BF858CBA94043A
SHA256:B1DF40462EAF508C6640323DCB52F4F6DDFAB15B21C312B605355C91F3048374
2484WinRAR.exeC:\Users\admin\Desktop\400000.memexecutable
MD5:1E24B6E939C994055A10D8A08FD77899
SHA256:BB5666BD8FD27A927D932CEE1F52AE7E260E26FDA829D8D94FB5CA0653CAF620
2484WinRAR.exeC:\Users\admin\Desktop\ike_megalodon_packedexecutable
MD5:72A81F7399CD3FCF0A441A69322E25BB
SHA256:C62201D9CA93CE1F44923B432EA4CDD67342D1865A9DC189CFD7FBB9AD133C01
2484WinRAR.exeC:\Users\admin\Desktop\stub_3.binexecutable
MD5:987FAC5332E70F6573E8192FCFE1571D
SHA256:9F2E234A35B042A326587BFF59EBB4F12AE407E83774AAA1D7CFCB22AEBC0D32
2484WinRAR.exeC:\Users\admin\Desktop\4000000_extractexecutable
MD5:1D4FAC18CB041AA2061BB77544A833A1
SHA256:0EB9E5C03FD0A6AB0E9F67A3D9BA97BEB39F93E7F93C4FE8AF7C056B36FE4C25
2484WinRAR.exeC:\Users\admin\Desktop\stub.binexecutable
MD5:034090580D4F1C548943DF4765E49088
SHA256:654F368FB2E691C75C56F2E65CE76920B1131E93A82400AAAA6549E45BEBE367
2484WinRAR.exeC:\Users\admin\Desktop\Builder.binexecutable
MD5:7EBF3823FE59D260C541DB2186BF6E11
SHA256:59F1C7B9A855C8C3D9B3DEE9D4E609F854014737F337D86D7317A2674E88BC6C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4060
ike_megalodon_packed.exe
GET
200
52.202.139.131:80
http://checkip.amazonaws.com/
US
text
16 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4060
ike_megalodon_packed.exe
52.202.139.131:80
checkip.amazonaws.com
Amazon.com, Inc.
US
shared
4060
ike_megalodon_packed.exe
208.91.199.224:587
smtp.juki-pl.com
PDR
US
shared

DNS requests

Domain
IP
Reputation
smtp.juki-pl.com
  • 208.91.199.224
  • 208.91.199.225
  • 208.91.199.223
  • 208.91.198.143
malicious
checkip.amazonaws.com
  • 52.202.139.131
  • 52.1.46.34
  • 34.233.102.38
  • 34.192.84.239
  • 107.23.175.217
  • 52.204.60.216
shared

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
No debug info