Advertisement
paladin316

2935AZORult_68278fd6ff397394b1e9bd677bc56b77_exe_2019-09-24_20_30.txt

Sep 24th, 2019
1,725
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.35 KB | None | 0 0
  1.  
  2. * ID: 2935
  3. * MalFamily: ""
  4.  
  5. * MalScore: 10.0
  6.  
  7. * File Name: "AZORult_68278fd6ff397394b1e9bd677bc56b77.exe"
  8. * File Size: 608768
  9. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  10. * SHA256: "1b50e39aed376d55fdf5a2e3e1a72beb5f2f9e6429e753acf6d35e895b479b0b"
  11. * MD5: "68278fd6ff397394b1e9bd677bc56b77"
  12. * SHA1: "f3180ae8e2a42416c86ab13df86a86625d0dac9c"
  13. * SHA512: "3168e150f71e1f3a2facc579f6b49900f17e4b88b76238bcb243c028174b6dbac1a09688772cfe47fa352f5df082bcdb7055b2481aacb044fe73b75f318aa7d8"
  14. * CRC32: "4E8A9A74"
  15. * SSDEEP: "6144:9qenBL4WQ42alSoruzk3LMrJ+TwAO2TIAOpTOzyx4//KyN7+UoWJF+gCTL90Sqrg:9BXQpaBYGLA+Tw90X14z+CT50Sq7fw"
  16.  
  17. * Process Execution:
  18. "ntxjgBij.exe"
  19.  
  20.  
  21. * Executed Commands:
  22.  
  23. * Signatures Detected:
  24.  
  25. "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
  26. "Details":
  27.  
  28.  
  29. "Description": "Behavioural detection: Executable code extraction",
  30. "Details":
  31.  
  32.  
  33. "Description": "Creates RWX memory",
  34. "Details":
  35.  
  36.  
  37. "Description": "Performs HTTP requests potentially not found in PCAP.",
  38. "Details":
  39.  
  40. "url_ioc": "backupproject.host:80//index.php"
  41.  
  42.  
  43.  
  44.  
  45. "Description": "The binary likely contains encrypted or compressed data.",
  46. "Details":
  47.  
  48. "section": "name: .rsrc, entropy: 7.56, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ, raw_size: 0x00047c00, virtual_size: 0x00047bd0"
  49.  
  50.  
  51.  
  52.  
  53. "Description": "File has been identified by 17 Antiviruses on VirusTotal as malicious",
  54. "Details":
  55.  
  56. "FireEye": "Generic.mg.68278fd6ff397394"
  57.  
  58.  
  59. "CrowdStrike": "win/malicious_confidence_100% (W)"
  60.  
  61.  
  62. "Symantec": "ML.Attribute.HighConfidence"
  63.  
  64.  
  65. "APEX": "Malicious"
  66.  
  67.  
  68. "Rising": "Trojan.Generic@ML.96 (RDML:YvAJXgHi5sKJMt3go9w+ng)"
  69.  
  70.  
  71. "TrendMicro": "Mal_HPGen-37b"
  72.  
  73.  
  74. "McAfee-GW-Edition": "BehavesLike.Win32.Generic.hc"
  75.  
  76.  
  77. "SentinelOne": "DFI - Suspicious PE"
  78.  
  79.  
  80. "Microsoft": "Trojan:Win32/Fuerboos.A!cl"
  81.  
  82.  
  83. "Endgame": "malicious (high confidence)"
  84.  
  85.  
  86. "AhnLab-V3": "Trojan/Win32.MalPacked.R287551"
  87.  
  88.  
  89. "Acronis": "suspicious"
  90.  
  91.  
  92. "VBA32": "BScope.Trojan.Yakes"
  93.  
  94.  
  95. "ESET-NOD32": "a variant of Win32/Kryptik.GWRD"
  96.  
  97.  
  98. "TrendMicro-HouseCall": "Mal_HPGen-37b"
  99.  
  100.  
  101. "Ikarus": "Trojan-Ransom.GandCrab"
  102.  
  103.  
  104. "Qihoo-360": "HEUR/QVM10.1.1ADB.Malware.Gen"
  105.  
  106.  
  107.  
  108.  
  109. "Description": "Collects information to fingerprint the system",
  110. "Details":
  111.  
  112.  
  113.  
  114. * Started Service:
  115.  
  116. * Mutexes:
  117. "Local\\_!MSFTHISTORY!_",
  118. "Local\\c:!users!user!appdata!local!microsoft!windows!temporary internet files!content.ie5!",
  119. "Local\\c:!users!user!appdata!roaming!microsoft!windows!cookies!",
  120. "Local\\c:!users!user!appdata!local!microsoft!windows!history!history.ie5!",
  121. "A81FB8C60-BBE6E186-FC9B5DB5-36DA4559-33946726"
  122.  
  123.  
  124. * Modified Files:
  125. "C:\\Users\\user\\AppData\\Local\\Temp\\Screen",
  126. "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\index.dat",
  127. "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\index.dat",
  128. "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\History\\History.IE5\\index.dat"
  129.  
  130.  
  131. * Deleted Files:
  132.  
  133. * Modified Registry Keys:
  134. "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\MediaResources\\msvideo"
  135.  
  136.  
  137. * Deleted Registry Keys:
  138.  
  139. * DNS Communications:
  140.  
  141. "type": "A",
  142. "request": "backupproject.host",
  143. "answers":
  144.  
  145.  
  146.  
  147. * Domains:
  148.  
  149. "ip": "31.41.44.35",
  150. "domain": "backupproject.host"
  151.  
  152.  
  153.  
  154. * Network Communication - ICMP:
  155.  
  156. * Network Communication - HTTP:
  157.  
  158. * Network Communication - SMTP:
  159.  
  160. * Network Communication - Hosts:
  161.  
  162. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement