Advertisement
paladin316

Troldesh_ed4d6fc3405022e04b9c1de62e61c7e3_jpg_2019-08-16_00_30.txt

Aug 15th, 2019
1,406
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.80 KB | None | 0 0
  1.  
  2. * MalFamily: "Malicious"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Troldesh_ed4d6fc3405022e04b9c1de62e61c7e3.jpg"
  7. * File Size: 1089712
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "5d9f69350810bdb5ee1a861b2dc58822e01ee6edee5c6d13dd43f4beef583103"
  10. * MD5: "ed4d6fc3405022e04b9c1de62e61c7e3"
  11. * SHA1: "b3c3969377a112f97b393f55db520b713676d88c"
  12. * SHA512: "631367c1a5cf56769cb6cd16f5eae2dbc93b2ed211fb4a4a6522b3eb6f92f1ea1277f57b30fefbf108cba173e4ba1ffe02dcc369dcc7c76a4f76c69a040d5f48"
  13. * CRC32: "29713375"
  14. * SSDEEP: "24576:I/7TbYcDa6BSSEkmfSRmjNr0HmO0g9miDnP9GA061MU8Hx:M7TajSENNO79FDPzr+t"
  15.  
  16. * Process Execution:
  17. "Troldesh_ed4d6fc3405022e04b9c1de62e61c7e3.jpg"
  18.  
  19.  
  20. * Executed Commands:
  21.  
  22. * Signatures Detected:
  23.  
  24. "Description": "Creates RWX memory",
  25. "Details":
  26.  
  27.  
  28. "Description": "A process attempted to delay the analysis task.",
  29. "Details":
  30.  
  31. "Process": "Troldesh_ed4d6fc3405022e04b9c1de62e61c7e3.jpg tried to sleep 504 seconds, actually delayed analysis time by 0 seconds"
  32.  
  33.  
  34.  
  35.  
  36. "Description": "Attempts to connect to a dead IP:Port (7 unique times)",
  37. "Details":
  38.  
  39. "IP": "208.83.223.34:80"
  40.  
  41.  
  42. "IP": "195.201.141.166:443"
  43.  
  44.  
  45. "IP": "144.76.71.91:8443"
  46.  
  47.  
  48. "IP": "173.56.36.10:9031"
  49.  
  50.  
  51. "IP": "154.35.32.5:443"
  52.  
  53.  
  54. "IP": "86.59.21.38:443"
  55.  
  56.  
  57. "IP": "171.25.193.9:80"
  58.  
  59.  
  60.  
  61.  
  62. "Description": "Starts servers listening on 127.0.0.1:58209",
  63. "Details":
  64.  
  65.  
  66. "Description": "Reads data out of its own binary image",
  67. "Details":
  68.  
  69. "self_read": "process: Troldesh_ed4d6fc3405022e04b9c1de62e61c7e3.jpg, pid: 2040, offset: 0x00000000, length: 0x0010a0b0"
  70.  
  71.  
  72.  
  73.  
  74. "Description": "The binary likely contains encrypted or compressed data.",
  75. "Details":
  76.  
  77. "section": "name: .rdata, entropy: 7.99, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ, raw_size: 0x000d8a00, virtual_size: 0x000d88e2"
  78.  
  79.  
  80. "section": "name: .rsrc, entropy: 7.04, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ, raw_size: 0x00023000, virtual_size: 0x0011fea8"
  81.  
  82.  
  83.  
  84.  
  85. "Description": "Installs Tor on the infected machine",
  86. "Details":
  87.  
  88.  
  89. "Description": "Installs itself for autorun at Windows startup",
  90. "Details":
  91.  
  92. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\Client Server Runtime Subsystem"
  93.  
  94.  
  95. "data": "\"C:\\ProgramData\\Windows\\csrss.exe\""
  96.  
  97.  
  98.  
  99.  
  100. "Description": "Collects information about installed applications",
  101. "Details":
  102.  
  103. "Program": "Google Update Helper"
  104.  
  105.  
  106.  
  107.  
  108. "Program": "Microsoft Excel MUI 2013"
  109.  
  110.  
  111. "Program": "Microsoft Outlook MUI 2013"
  112.  
  113.  
  114.  
  115.  
  116. "Program": "Google Chrome"
  117.  
  118.  
  119. "Program": "Adobe Flash Player 29 NPAPI"
  120.  
  121.  
  122. "Program": "Adobe Flash Player 29 ActiveX"
  123.  
  124.  
  125. "Program": "Microsoft DCF MUI 2013"
  126.  
  127.  
  128. "Program": "Microsoft Access MUI 2013"
  129.  
  130.  
  131. "Program": "Microsoft Office Proofing Tools 2013 - English"
  132.  
  133.  
  134. "Program": "Adobe Acrobat Reader DC"
  135.  
  136.  
  137. "Program": "Microsoft Publisher MUI 2013"
  138.  
  139.  
  140. "Program": "Microsoft Office Shared MUI 2013"
  141.  
  142.  
  143. "Program": "Microsoft Office OSM MUI 2013"
  144.  
  145.  
  146. "Program": "Microsoft InfoPath MUI 2013"
  147.  
  148.  
  149. "Program": "Microsoft Office Shared Setup Metadata MUI 2013"
  150.  
  151.  
  152. "Program": "Outils de v\\xc3\\xa9rification linguistique 2013 de Microsoft Office\\xc2\\xa0- Fran\\xc3\\xa7ais"
  153.  
  154.  
  155. "Program": "Microsoft Word MUI 2013"
  156.  
  157.  
  158. "Program": "Microsoft OneDrive"
  159.  
  160.  
  161. "Program": "Microsoft Groove MUI 2013"
  162.  
  163.  
  164. "Program": "Microsoft Office Proofing Tools 2013 - Espa\\xc3\\xb1ol"
  165.  
  166.  
  167.  
  168.  
  169. "Program": "Microsoft Access Setup Metadata MUI 2013"
  170.  
  171.  
  172. "Program": "Microsoft Office OSM UX MUI 2013"
  173.  
  174.  
  175. "Program": "Java Auto Updater"
  176.  
  177.  
  178. "Program": "Microsoft PowerPoint MUI 2013"
  179.  
  180.  
  181. "Program": "Microsoft Office Professional Plus 2013"
  182.  
  183.  
  184. "Program": "Adobe Refresh Manager"
  185.  
  186.  
  187. "Program": "Microsoft Office Proofing 2013"
  188.  
  189.  
  190. "Program": "Microsoft Lync MUI 2013"
  191.  
  192.  
  193.  
  194.  
  195. "Program": "Microsoft OneNote MUI 2013"
  196.  
  197.  
  198.  
  199.  
  200. "Description": "Creates a hidden or system file",
  201. "Details":
  202.  
  203. "file": "C:\\ProgramData\\Windows\\"
  204.  
  205.  
  206.  
  207.  
  208. "Description": "File has been identified by 21 Antiviruses on VirusTotal as malicious",
  209. "Details":
  210.  
  211. "McAfee": "GenericRXII-JX!ED4D6FC34050"
  212.  
  213.  
  214. "CrowdStrike": "win/malicious_confidence_70% (D)"
  215.  
  216.  
  217. "F-Prot": "W32/Agent.BAE.gen!Eldorado"
  218.  
  219.  
  220. "Symantec": "Packed.Generic.459"
  221.  
  222.  
  223. "ESET-NOD32": "a variant of Win32/Kryptik.GLWT"
  224.  
  225.  
  226. "APEX": "Malicious"
  227.  
  228.  
  229. "Invincea": "heuristic"
  230.  
  231.  
  232. "Trapmine": "malicious.high.ml.score"
  233.  
  234.  
  235. "FireEye": "Generic.mg.ed4d6fc3405022e0"
  236.  
  237.  
  238. "Emsisoft": "Trojan-Ransom.Shade (A)"
  239.  
  240.  
  241. "SentinelOne": "DFI - Suspicious PE"
  242.  
  243.  
  244. "Cyren": "W32/Agent.BAE.gen!Eldorado"
  245.  
  246.  
  247. "Antiy-AVL": "Trojan/Win32.AGeneric"
  248.  
  249.  
  250. "Endgame": "malicious (high confidence)"
  251.  
  252.  
  253. "Acronis": "suspicious"
  254.  
  255.  
  256. "VBA32": "Malware-Cryptor.Kirgudu"
  257.  
  258.  
  259. "Rising": "Trojan.Generic@ML.100 (RDML:1vKBTeJ23iChxD854QJl2g)"
  260.  
  261.  
  262. "Ikarus": "Trojan-Ransom.Crypted007"
  263.  
  264.  
  265. "eGambit": "PE.Heur.InvalidSig"
  266.  
  267.  
  268. "Fortinet": "W32/Kryptik.GLWT!tr"
  269.  
  270.  
  271. "Qihoo-360": "HEUR/QVM10.1.3A81.Malware.Gen"
  272.  
  273.  
  274.  
  275.  
  276. "Description": "Creates a copy of itself",
  277. "Details":
  278.  
  279. "copy": "C:\\ProgramData\\Windows\\csrss.exe"
  280.  
  281.  
  282.  
  283.  
  284. "Description": "Harvests information related to installed mail clients",
  285. "Details":
  286.  
  287. "file": "C:\\Users\\user\\Documents\\Outlook Files\\Outlook.pst"
  288.  
  289.  
  290.  
  291.  
  292. "Description": "Anomalous binary characteristics",
  293. "Details":
  294.  
  295. "anomaly": "Actual checksum does not match that reported in PE header"
  296.  
  297.  
  298.  
  299.  
  300. "Description": "Created network traffic indicative of malicious activity",
  301. "Details":
  302.  
  303. "signature": "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 659"
  304.  
  305.  
  306. "signature": "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 154"
  307.  
  308.  
  309. "signature": "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 191"
  310.  
  311.  
  312. "signature": "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 295"
  313.  
  314.  
  315. "signature": "ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 201"
  316.  
  317.  
  318.  
  319.  
  320.  
  321. * Started Service:
  322.  
  323. * Mutexes:
  324.  
  325. * Modified Files:
  326. "\\??\\PIPE\\wkssvc",
  327. "C:\\ProgramData\\Windows\\csrss.exe",
  328. "\\??\\PIPE\\srvsvc",
  329. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\lock",
  330. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\state.tmp",
  331. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\state",
  332. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\unverified-microdesc-consensus.tmp",
  333. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\unverified-microdesc-consensus",
  334. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\cached-certs.tmp",
  335. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\cached-certs",
  336. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\cached-microdesc-consensus.tmp",
  337. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\cached-microdesc-consensus",
  338. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\cached-microdescs.new"
  339.  
  340.  
  341. * Deleted Files:
  342. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\state.tmp",
  343. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\unverified-microdesc-consensus.tmp",
  344. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\cached-certs.tmp",
  345. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\unverified-microdesc-consensus",
  346. "C:\\Users\\user\\AppData\\Local\\Temp\\6893A5D897\\cached-microdesc-consensus.tmp"
  347.  
  348.  
  349. * Modified Registry Keys:
  350. "HKEY_LOCAL_MACHINE\\SOFTWARE\\System32\\Configuration\\",
  351. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\System32\\Configuration\\xi",
  352. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\Client Server Runtime Subsystem",
  353. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\System32\\Configuration\\xVersion"
  354.  
  355.  
  356. * Deleted Registry Keys:
  357.  
  358. * DNS Communications:
  359.  
  360. * Domains:
  361.  
  362. * Network Communication - ICMP:
  363.  
  364. * Network Communication - HTTP:
  365.  
  366. * Network Communication - SMTP:
  367.  
  368. * Network Communication - Hosts:
  369.  
  370. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement