Advertisement
paladin316

2398Pony_e66b8fb74f7a5d490b39b718be129134_exe_2019-09-19_06_30.txt

Sep 19th, 2019
1,726
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.15 KB | None | 0 0
  1.  
  2. * ID: 2398
  3. * MalFamily: "Malicious"
  4.  
  5. * MalScore: 10.0
  6.  
  7. * File Name: "Pony_e66b8fb74f7a5d490b39b718be129134.exe"
  8. * File Size: 291840
  9. * File Type: "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows"
  10. * SHA256: "13d47b45e8f68e833d6cb30a463f2ae09aa5a14e95230780efc48237cb2be624"
  11. * MD5: "e66b8fb74f7a5d490b39b718be129134"
  12. * SHA1: "9a71153ee74ffe942b9bcba9109e6e392e22c02b"
  13. * SHA512: "77c6b0568a41c51ff47c5de1356009af63cc1c16041fd2446b850bd3310a25e9a36f49cdc228dd3a7e69946727bc6dc7ede6d11af8a289917e8bedadfb3d1f64"
  14. * CRC32: "48D777CC"
  15. * SSDEEP: "6144:+0MZPlvCy5lpzT8zoEnr8ym7OKUNQyVqTmZ6MBJSmAuCCI0JC:sxCy5LzT8zoKvmKKUCyV7LBEnCI0J"
  16.  
  17. * Process Execution:
  18. "AuB94vaqyGOObkG.exe",
  19. "schtasks.exe",
  20. "svchost.exe"
  21.  
  22.  
  23. * Executed Commands:
  24. "\"C:\\Windows\\System32\\schtasks.exe\" /Create /TN \"Updates\\RrDcAB\" /XML \"C:\\Users\\user\\AppData\\Local\\Temp\\tmp4297.tmp\"",
  25. "schtasks.exe /Create /TN \"Updates\\RrDcAB\" /XML \"C:\\Users\\user\\AppData\\Local\\Temp\\tmp4297.tmp\""
  26.  
  27.  
  28. * Signatures Detected:
  29.  
  30. "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
  31. "Details":
  32.  
  33.  
  34. "Description": "Behavioural detection: Executable code extraction",
  35. "Details":
  36.  
  37.  
  38. "Description": "Guard pages use detected - possible anti-debugging.",
  39. "Details":
  40.  
  41.  
  42. "Description": "A process created a hidden window",
  43. "Details":
  44.  
  45. "Process": "AuB94vaqyGOObkG.exe -> schtasks.exe"
  46.  
  47.  
  48.  
  49.  
  50. "Description": "The binary likely contains encrypted or compressed data.",
  51. "Details":
  52.  
  53. "section": "name: .text, entropy: 7.70, characteristics: IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ, raw_size: 0x00045400, virtual_size: 0x00045304"
  54.  
  55.  
  56.  
  57.  
  58. "Description": "Uses Windows utilities for basic functionality",
  59. "Details":
  60.  
  61. "command": "\"C:\\Windows\\System32\\schtasks.exe\" /Create /TN \"Updates\\RrDcAB\" /XML \"C:\\Users\\user\\AppData\\Local\\Temp\\tmp4297.tmp\""
  62.  
  63.  
  64. "command": "schtasks.exe /Create /TN \"Updates\\RrDcAB\" /XML \"C:\\Users\\user\\AppData\\Local\\Temp\\tmp4297.tmp\""
  65.  
  66.  
  67.  
  68.  
  69. "Description": "Attempts to execute a Living Off The Land Binary command for post exeploitation",
  70. "Details":
  71.  
  72. "MITRE T1078 - schtask": "(Tactic: Execution, Persistence, Privilege Escalation)"
  73.  
  74.  
  75.  
  76.  
  77. "Description": "Stack pivoting was detected when using a critical API",
  78. "Details":
  79.  
  80. "process": "svchost.exe:884"
  81.  
  82.  
  83.  
  84.  
  85. "Description": "Creates a hidden or system file",
  86. "Details":
  87.  
  88. "file": "C:\\Users\\user\\AppData\\Roaming\\RrDcAB.exe"
  89.  
  90.  
  91.  
  92.  
  93. "Description": "File has been identified by 15 Antiviruses on VirusTotal as malicious",
  94. "Details":
  95.  
  96. "FireEye": "Generic.mg.e66b8fb74f7a5d49"
  97.  
  98.  
  99. "Cybereason": "malicious.ee74ff"
  100.  
  101.  
  102. "Invincea": "heuristic"
  103.  
  104.  
  105. "APEX": "Malicious"
  106.  
  107.  
  108. "Kaspersky": "UDS:DangerousObject.Multi.Generic"
  109.  
  110.  
  111. "Paloalto": "generic.ml"
  112.  
  113.  
  114. "Tencent": "Win32.Trojan.Inject.Auto"
  115.  
  116.  
  117. "Endgame": "malicious (high confidence)"
  118.  
  119.  
  120. "ZoneAlarm": "UDS:DangerousObject.Multi.Generic"
  121.  
  122.  
  123. "AhnLab-V3": "Spyware/Win32.KeyLogger.C131843"
  124.  
  125.  
  126. "Acronis": "suspicious"
  127.  
  128.  
  129. "Cylance": "Unsafe"
  130.  
  131.  
  132. "ESET-NOD32": "a variant of MSIL/GenKryptik.DTGY"
  133.  
  134.  
  135. "SentinelOne": "DFI - Malicious PE"
  136.  
  137.  
  138. "CrowdStrike": "win/malicious_confidence_80% (W)"
  139.  
  140.  
  141.  
  142.  
  143. "Description": "Creates a copy of itself",
  144. "Details":
  145.  
  146. "copy": "C:\\Users\\user\\AppData\\Roaming\\RrDcAB.exe"
  147.  
  148.  
  149.  
  150.  
  151.  
  152. * Started Service:
  153.  
  154. * Mutexes:
  155. "Global\\CLR_PerfMon_WrapMutex",
  156. "Global\\CLR_CASOFF_MUTEX"
  157.  
  158.  
  159. * Modified Files:
  160. "C:\\Users\\user\\AppData\\Local\\GDIPFONTCACHEV1.DAT",
  161. "C:\\Users\\user\\AppData\\Roaming\\RrDcAB.exe",
  162. "C:\\Users\\user\\AppData\\Local\\Temp\\tmp4297.tmp",
  163. "C:\\Windows\\SoftwareDistribution\\DataStore\\DataStore.edb",
  164. "C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\edb.chk"
  165.  
  166.  
  167. * Deleted Files:
  168. "C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\edbtmp.log"
  169.  
  170.  
  171. * Modified Registry Keys:
  172.  
  173. * Deleted Registry Keys:
  174.  
  175. * DNS Communications:
  176.  
  177. * Domains:
  178.  
  179. * Network Communication - ICMP:
  180.  
  181. * Network Communication - HTTP:
  182.  
  183. * Network Communication - SMTP:
  184.  
  185. * Network Communication - Hosts:
  186.  
  187. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement