Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- * ID: 824
- * MalFamily: ""
- * MalScore: 10.0
- * File Name: "Exes_b09e2805f08c013b8169b7ba1239a37e.exe"
- * File Size: 838656
- * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
- * SHA256: "9fe345665c86307bfd87b2cc3c24f225065db32f8d50adc3ab3cd495351111d4"
- * MD5: "b09e2805f08c013b8169b7ba1239a37e"
- * SHA1: "7a9a799ccd663e9129b38d6fcae0cc0f11277bcd"
- * SHA512: "34247c936c15925cfe2903d4b64613310c723ef3d1bc61a368f5647f7949632e5c677f019e610a45fde3c2269401515988366cad6f8808338c4783e209c2fdde"
- * CRC32: "401A6446"
- * SSDEEP: "12288:iDO7ddpVxS7Wx8IuJjeK98Pqs1Boe0tdQ9/95tUmbQ3j66BCMgyWbCA:iDORLVx8lJkPqsPf95xY6EC6WmA"
- * Process Execution:
- "Bi4OjHgj0g7ry.exe",
- "\u0430\u043f\u043c\u0438\u0412\u044b\u0443\u0435\u0424\u042b.exe",
- "svchost.exe",
- "services.exe",
- "lsass.exe",
- "WmiApSrv.exe",
- "svchost.exe",
- "WmiPrvSE.exe"
- * Executed Commands:
- "\"C:\\ProgramData\\\\xd0\\xb0\\xd0\\xbf\\xd0\\xbc\\xd0\\xb8\\xd0\\x92\\xd1\\x8b\\xd1\\x83\\xd0\\xb5\\xd0\\xa4\\xd0\\xab.exe\"",
- "C:\\ProgramData\\\\xd0\\xb0\\xd0\\xbf\\xd0\\xbc\\xd0\\xb8\\xd0\\x92\\xd1\\x8b\\xd1\\x83\\xd0\\xb5\\xd0\\xa4\\xd0\\xab.exe ",
- "C:\\Windows\\system32\\svchost.exe",
- "C:\\Windows\\system32\\lsass.exe",
- "C:\\Windows\\system32\\wbem\\WmiApSrv.exe",
- "C:\\Windows\\system32\\svchost.exe -k netsvcs"
- * Signatures Detected:
- "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
- "Details":
- "Description": "Behavioural detection: Executable code extraction",
- "Details":
- "Description": "Creates RWX memory",
- "Details":
- "Description": "Guard pages use detected - possible anti-debugging.",
- "Details":
- "Description": "A process created a hidden window",
- "Details":
- "Process": "Bi4OjHgj0g7ry.exe -> C:\\ProgramData\\\\xd0\\xb0\\xd0\\xbf\\xd0\\xbc\\xd0\\xb8\\xd0\\x92\\xd1\\x8b\\xd1\\x83\\xd0\\xb5\\xd0\\xa4\\xd0\\xab.exe"
- "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
- "Details":
- "Spam": "services.exe (500) called API GetSystemTimeAsFileTime 1761503 times"
- "Description": "Likely virus infection of existing system binary",
- "Details":
- "file": "c:\\programdata\\\\xd0\\xb0\\xd0\\xbf\\xd0\\xbc\\xd0\\xb8\\xd0\\x92\\xd1\\x8b\\xd1\\x83\\xd0\\xb5\\xd0\\xa4\\xd0\\xab.exe"
- "Description": "File has been identified by 29 Antiviruses on VirusTotal as malicious",
- "Details":
- "McAfee": "Artemis!B09E2805F08C"
- "K7AntiVirus": "Trojan ( 00556e511 )"
- "K7GW": "Trojan ( 00556e511 )"
- "TrendMicro": "TrojanSpy.Win32.TRICKBOT.SMKA"
- "Symantec": "Trojan Horse"
- "ESET-NOD32": "a variant of Generik.ISICFUQ"
- "APEX": "Malicious"
- "Paloalto": "generic.ml"
- "GData": "Win32.Trojan-Spy.TrickBot.COURLV"
- "Kaspersky": "Trojan-Dropper.Win32.Dapato.pwev"
- "Sophos": "Mal/Generic-S"
- "F-Secure": "Trojan.TR/AD.Inject.lniac"
- "Invincea": "heuristic"
- "McAfee-GW-Edition": "BehavesLike.Win32.Dropper.ch"
- "Ikarus": "Trojan.SuspectCRC"
- "Webroot": "W32.Trojan.Gen"
- "Avira": "TR/AD.Inject.lniac"
- "Antiy-AVL": "TrojanDropper/Win32.Dapato"
- "Microsoft": "Trojan:Win32/TrickBot.I"
- "AegisLab": "Trojan.Win32.Dapato.b!c"
- "ZoneAlarm": "Trojan-Dropper.Win32.Dapato.pwev"
- "AhnLab-V3": "Trojan/Win32.Trickbot.C3450646"
- "Malwarebytes": "Spyware.TrickBot"
- "Panda": "Trj/GdSda.A"
- "TrendMicro-HouseCall": "TrojanSpy.Win32.TRICKBOT.SMKA"
- "Fortinet": "W32/Generik.ISICFUQ!tr"
- "AVG": "Win32:Trojan-gen"
- "Avast": "Win32:Trojan-gen"
- "Qihoo-360": "Win32/Trojan.Dropper.7e1"
- "Description": "Creates a copy of itself",
- "Details":
- "copy": "C:\\ProgramData\\\\xd0\\xb0\\xd0\\xbf\\xd0\\xbc\\xd0\\xb8\\xd0\\x92\\xd1\\x8b\\xd1\\x83\\xd0\\xb5\\xd0\\xa4\\xd0\\xab.exe"
- * Started Service:
- "KeyIso",
- "wmiApSrv"
- * Mutexes:
- "Global\\838B6C9EB27932960",
- "Global\\RefreshRA_Mutex_Lib",
- "Global\\RefreshRA_Mutex",
- "Global\\RefreshRA_Mutex_Flag",
- "Global\\WmiApSrv"
- * Modified Files:
- "C:\\ProgramData\\\\xd0\\xb0\\xd0\\xbf\\xd0\\xbc\\xd0\\xb8\\xd0\\x92\\xd1\\x8b\\xd1\\x83\\xd0\\xb5\\xd0\\xa4\\xd0\\xab.exe",
- "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-0000000000-0000000000-0000000000-1000\\00000000-0000-0000-0000-000000000000b_00000000-0000-0000-0000-000000000000",
- "\\??\\WMIDataDevice",
- "\\??\\PIPE\\samr",
- "C:\\Windows\\sysnative\\wbem\\repository\\WRITABLE.TST",
- "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING1.MAP",
- "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING2.MAP",
- "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING3.MAP",
- "C:\\Windows\\sysnative\\wbem\\repository\\OBJECTS.DATA",
- "C:\\Windows\\sysnative\\wbem\\repository\\INDEX.BTR",
- "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2PROVIDERSUBSYSTEM",
- "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2WMI SELF-INSTRUMENTATION EVENT PROVIDER"
- * Deleted Files:
- * Modified Registry Keys:
- "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\wmiApSrv\\Type",
- "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winmgmt\\Type",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\PROVIDERS\\Performance\\Performance Refreshed",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ProcessID",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ThrottleDrege",
- "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winmgmt\\Parameters\\ServiceDllUnloadOnStop",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\LastServiceStart",
- "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Wbem\\Transports\\Decoupled\\Server",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\CreationTime",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\MarshaledProxy",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\ProcessIdentifier",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ConfigValueEssNeedsLoading",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\List of event-active namespaces",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\ESS\\//./root/CIMV2\\SCM Event Provider"
- * Deleted Registry Keys:
- * DNS Communications:
- * Domains:
- * Network Communication - ICMP:
- * Network Communication - HTTP:
- * Network Communication - SMTP:
- * Network Communication - Hosts:
- * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement