analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

Paypal+Cracker.zip

Full analysis: https://app.any.run/tasks/a2d7e734-df29-469b-ada6-58622a762ee6
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: August 13, 2019, 23:01:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
njrat
bladabindi
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

6671E4F58EEBFA0C29858BC57E76A69B

SHA1:

7D6171B20F780738D3FC41283A0244D111390455

SHA256:

FF5F86F71B7A29BAB8BE623E439ACEFF392EDC2AEDF8E4D36DD68CAAA691345F

SSDEEP:

24576:X0is+FJhjrqOcXdmJ59iyTxF2+DzNTVOJDbp:xnq+5LD2YVOVbp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Paypal Cracker.exe (PID: 3680)
      • Paypal Cracker.exe (PID: 2812)
    • Writes to a start menu file

      • Paypal Cracker.exe (PID: 2812)
    • NJRAT was detected

      • RegAsm.exe (PID: 3632)
  • SUSPICIOUS

    • Uses NETSH.EXE for network configuration

      • RegAsm.exe (PID: 3632)
    • Executable content was dropped or overwritten

      • Paypal Cracker.exe (PID: 2812)
    • Creates files in the user directory

      • Paypal Cracker.exe (PID: 2812)
  • INFO

    • Manual execution by user

      • Paypal Cracker.exe (PID: 2812)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Paypal Cracker.exe
ZipUncompressedSize: 2396672
ZipCompressedSize: 1235637
ZipCRC: 0x188f2010
ZipModifyDate: 2019:05:09 18:25:18
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs paypal cracker.exe paypal cracker.exe no specs #NJRAT regasm.exe netsh.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2308"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Paypal+Cracker.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2812"C:\Users\admin\Desktop\Paypal Cracker.exe" C:\Users\admin\Desktop\Paypal Cracker.exe
explorer.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
Paypal Cracker By Z4M4N3
Version:
...
3680"C:\Users\admin\AppData\Local\Temp\Paypal Cracker.exe"C:\Users\admin\AppData\Local\Temp\Paypal Cracker.exePaypal Cracker.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
Paypal Cracker By Z4M4N3
Exit code:
0
Version:
1.0.0.0
3632"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
Paypal Cracker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Version:
2.0.50727.5420 (Win7SP1.050727-5400)
3408netsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLEC:\Windows\system32\netsh.exeRegAsm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
978
Read events
858
Write events
117
Delete events
3

Modification events

(PID) Process:(2308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2308) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Paypal+Cracker.zip
(PID) Process:(2308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(2308) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\AppData\Local\Temp
Executable files
2
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2308WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2308.33956\Paypal Cracker.exe
MD5:
SHA256:
2812Paypal Cracker.exeC:\Users\admin\AppData\Roaming\Windows Defender\relog.vbstext
MD5:300A27CE23D51D750305EA4DC422F36C
SHA256:50F3AF2A9779C3B01385B0A3898B925340CF441367A61CCD29A7F34B73B663BC
2812Paypal Cracker.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\relog.urltext
MD5:6675ED0EC57D6AE7C5DE6773E77A858F
SHA256:D9BB9DB5C6490587FA1BA14D43C18FE19AD28AA7C104CB0BB4ACD0F37896E1D1
2812Paypal Cracker.exeC:\Users\admin\AppData\Local\Temp\Paypal Cracker.exeexecutable
MD5:278C57693A1650C84867225C63FA5D1A
SHA256:87FEB6BAD4C90435AFC1651A4B62A1FD3273F20052B2B2D6DE70BDA574E1A9BA
2812Paypal Cracker.exeC:\Users\admin\AppData\Roaming\Windows Defender\Antimalware Service Executableexecutable
MD5:4B53FF26E08AFA2622706B69360A8BF8
SHA256:321577EE59B181B5D6B4A3132C13F3DB58AF66DFD0258ECE77989A5BF737A7CD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3632
RegAsm.exe
172.111.154.46:5557
noway74.ddns.net
AltusHost B.V.
GB
malicious

DNS requests

Domain
IP
Reputation
noway74.ddns.net
  • 172.111.154.46
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info