Advertisement
paladin316

Exes_59b7614d00bd1f06ad991521816ad61e_exe_2019-07-22_13_30.txt

Jul 22nd, 2019
1,397
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.69 KB | None | 0 0
  1.  
  2. * MalFamily: "Nanocore"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Exes_59b7614d00bd1f06ad991521816ad61e.exe"
  7. * File Size: 1644032
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "cdb995f6a1142caf5de8527902e32cef1159f4d9cf2e657b42373e9e73a09d74"
  10. * MD5: "59b7614d00bd1f06ad991521816ad61e"
  11. * SHA1: "1a837326315c28448c8dbd58a37d90d2b1c72408"
  12. * SHA512: "a4f49503d2407d2ab2ffb282950f94c7477c1b1804cd6d56c7cf2d1a9f81ea60685027a294e22d12c5aee03e6ef0f8b9a2b91f5c57998589fc35a6c692bf635f"
  13. * CRC32: "5F05C066"
  14. * SSDEEP: "24576:4AHnh+eWsN3skA4RV1Hom2KXMmHa6NNP+Kb9W3eniAvIJ0LM/Zkg+DRQrKOOD058:/h+ZkldoPK8Ya6NUKb9WqIJ00en058"
  15.  
  16. * Process Execution:
  17. "Exes_59b7614d00bd1f06ad991521816ad61e.exe",
  18. "RegSvcs.exe"
  19.  
  20.  
  21. * Executed Commands:
  22.  
  23. * Signatures Detected:
  24.  
  25. "Description": "Attempts to connect to a dead IP:Port (2 unique times)",
  26. "Details":
  27.  
  28. "IP": "185.217.1.156:1129"
  29.  
  30.  
  31. "IP": "194.5.98.84:1129"
  32.  
  33.  
  34.  
  35.  
  36. "Description": "Creates RWX memory",
  37. "Details":
  38.  
  39.  
  40. "Description": "A process attempted to delay the analysis task.",
  41. "Details":
  42.  
  43. "Process": "RegSvcs.exe tried to sleep 1072 seconds, actually delayed analysis time by 0 seconds"
  44.  
  45.  
  46.  
  47.  
  48. "Description": "At least one IP Address, Domain, or File Name was found in a crypto call",
  49. "Details":
  50.  
  51. "ioc": "v2.0.50727"
  52.  
  53.  
  54.  
  55.  
  56. "Description": "Expresses interest in specific running processes",
  57. "Details":
  58.  
  59. "process": "dwm.exe"
  60.  
  61.  
  62. "process": "RegSvcs.exe"
  63.  
  64.  
  65.  
  66.  
  67. "Description": "Reads data out of its own binary image",
  68. "Details":
  69.  
  70. "self_read": "process: Exes_59b7614d00bd1f06ad991521816ad61e.exe, pid: 1652, offset: 0x00000000, length: 0x00191600"
  71.  
  72.  
  73. "self_read": "process: RegSvcs.exe, pid: 1864, offset: 0x00000000, length: 0x00001000"
  74.  
  75.  
  76. "self_read": "process: RegSvcs.exe, pid: 1864, offset: 0x00000080, length: 0x00000200"
  77.  
  78.  
  79. "self_read": "process: RegSvcs.exe, pid: 1864, offset: 0x00000178, length: 0x00000200"
  80.  
  81.  
  82. "self_read": "process: RegSvcs.exe, pid: 1864, offset: 0x00005b20, length: 0x00000200"
  83.  
  84.  
  85. "self_read": "process: RegSvcs.exe, pid: 1864, offset: 0x00005b3c, length: 0x00000200"
  86.  
  87.  
  88.  
  89.  
  90. "Description": "The binary likely contains encrypted or compressed data.",
  91. "Details":
  92.  
  93. "section": "name: .rsrc, entropy: 7.88, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ, raw_size: 0x000c7000, virtual_size: 0x000c6fa0"
  94.  
  95.  
  96.  
  97.  
  98. "Description": "Executed a process and injected code into it, probably while unpacking",
  99. "Details":
  100.  
  101. "Injection": "Exes_59b7614d00bd1f06ad991521816ad61e.exe(1652) -> RegSvcs.exe(1864)"
  102.  
  103.  
  104.  
  105.  
  106. "Description": "Attempts to remove evidence of file being downloaded from the Internet",
  107. "Details":
  108.  
  109. "file": "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegSvcs.exe:Zone.Identifier"
  110.  
  111.  
  112.  
  113.  
  114. "Description": "Installs itself for autorun at Windows startup",
  115. "Details":
  116.  
  117. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\GmvrIrEvSa"
  118.  
  119.  
  120. "data": "C:\\Users\\Public\\GmvrIrEvSa.vbs"
  121.  
  122.  
  123.  
  124.  
  125. "Description": "Exhibits behavior characteristic of Nanocore RAT",
  126. "Details":
  127.  
  128.  
  129. "Description": "File has been identified by 26 Antiviruses on VirusTotal as malicious",
  130. "Details":
  131.  
  132. "MicroWorld-eScan": "Trojan.Agent.EATP"
  133.  
  134.  
  135. "FireEye": "Trojan.Agent.EATP"
  136.  
  137.  
  138. "ALYac": "Trojan.Agent.EATP"
  139.  
  140.  
  141. "Arcabit": "Trojan.Agent.EATP"
  142.  
  143.  
  144. "F-Prot": "W32/AutoIt.IJ.gen!Eldorado"
  145.  
  146.  
  147. "Symantec": "ML.Attribute.HighConfidence"
  148.  
  149.  
  150. "APEX": "Malicious"
  151.  
  152.  
  153. "Paloalto": "generic.ml"
  154.  
  155.  
  156. "Kaspersky": "HEUR:Trojan.Win32.Generic"
  157.  
  158.  
  159. "BitDefender": "Trojan.Agent.EATP"
  160.  
  161.  
  162. "Ad-Aware": "Trojan.Agent.EATP"
  163.  
  164.  
  165. "Emsisoft": "Trojan.Agent.EATP (B)"
  166.  
  167.  
  168. "Invincea": "heuristic"
  169.  
  170.  
  171. "McAfee-GW-Edition": "BehavesLike.Win32.Downloader.tc"
  172.  
  173.  
  174. "Cyren": "W32/AutoIt.IJ.gen!Eldorado"
  175.  
  176.  
  177. "Microsoft": "Trojan:Win32/Wacatac.B!ml"
  178.  
  179.  
  180. "Endgame": "malicious (high confidence)"
  181.  
  182.  
  183. "ZoneAlarm": "HEUR:Trojan.Win32.Generic"
  184.  
  185.  
  186. "GData": "Trojan.Agent.EATP (2x)"
  187.  
  188.  
  189. "AhnLab-V3": "Trojan/Win32.RL_AutoInj.R272810"
  190.  
  191.  
  192. "Acronis": "suspicious"
  193.  
  194.  
  195. "ESET-NOD32": "a variant of Win32/Injector.Autoit.EDR"
  196.  
  197.  
  198. "Rising": "Trojan.Win32.Agent_.sa (CLASSIC)"
  199.  
  200.  
  201. "Cybereason": "malicious.6315c2"
  202.  
  203.  
  204. "Panda": "Trj/Genetic.gen"
  205.  
  206.  
  207. "Qihoo-360": "HEUR/QVM10.1.AFC3.Malware.Gen"
  208.  
  209.  
  210.  
  211.  
  212. "Description": "Creates a slightly modified copy of itself",
  213. "Details":
  214.  
  215. "file": "C:\\Users\\user\\AppData\\Roaming\\RtDCpl64\\adprovider.bat"
  216.  
  217.  
  218. "percent_match": 100
  219.  
  220.  
  221.  
  222.  
  223. "Description": "Collects information to fingerprint the system",
  224. "Details":
  225.  
  226.  
  227. "Description": "Anomalous binary characteristics",
  228. "Details":
  229.  
  230. "anomaly": "Actual checksum does not match that reported in PE header"
  231.  
  232.  
  233.  
  234.  
  235.  
  236. * Started Service:
  237.  
  238. * Mutexes:
  239. "Global\\CLR_CASOFF_MUTEX",
  240. "Global\\7b902218-069b-4546-af78-0d2d86c9fc07",
  241. "Global\\.net clr networking"
  242.  
  243.  
  244. * Modified Files:
  245. "C:\\Users\\user\\AppData\\Roaming\\RtDCpl64\\adprovider.bat",
  246. "C:\\Users\\Public\\GmvrIrEvSa.vbs",
  247. "C:\\Users\\user\\AppData\\Roaming\\C1515A12-1764-4632-ACE9-A9DFF9253200\\run.dat"
  248.  
  249.  
  250. * Deleted Files:
  251. "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegSvcs.exe:Zone.Identifier"
  252.  
  253.  
  254. * Modified Registry Keys:
  255. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\GmvrIrEvSa"
  256.  
  257.  
  258. * Deleted Registry Keys:
  259.  
  260. * DNS Communications:
  261.  
  262. "type": "A",
  263. "request": "nanocore511.ddns.net",
  264. "answers":
  265.  
  266. "data": "185.217.1.156",
  267. "type": "A"
  268.  
  269.  
  270.  
  271.  
  272.  
  273. * Domains:
  274.  
  275. "ip": "185.217.1.156",
  276. "domain": "nanocore511.ddns.net"
  277.  
  278.  
  279.  
  280. * Network Communication - ICMP:
  281.  
  282. * Network Communication - HTTP:
  283.  
  284. * Network Communication - SMTP:
  285.  
  286. * Network Communication - Hosts:
  287.  
  288. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement