Advertisement
paladin316

Exes_aad8c740d091d4647974d59c57d58809_exe_2019-08-27_20_30.txt

Aug 27th, 2019
1,439
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.12 KB | None | 0 0
  1.  
  2. * MalFamily: ""
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Exes_aad8c740d091d4647974d59c57d58809.exe"
  7. * File Size: 2874880
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "696a568eb9e1264674b4dcaa90d73ecbb5e316550373de9f14996cee9f346421"
  10. * MD5: "aad8c740d091d4647974d59c57d58809"
  11. * SHA1: "9832bbc3ae9283591d965c20cffc936b5d59512a"
  12. * SHA512: "fa4f34ab9a9936ef5b2159f978c35ca1ca1a3724aa9663915c576e6c22621c5226730f2332b22967e5d83bf7bc527f5e435853e706bf29ee0cdb126b0799729a"
  13. * CRC32: "6495385D"
  14. * SSDEEP: "49152:+h+ZkldoPK9HKvBVuQDQMil5qp2XHqDD/Gb7SqZN8c:X2cPK9CnDKdX0D/GyEp"
  15.  
  16. * Process Execution:
  17. "HsErDyh.exe",
  18. "HsErDyh.exe"
  19.  
  20.  
  21. * Executed Commands:
  22.  
  23. * Signatures Detected:
  24.  
  25. "Description": "Behavioural detection: Executable code extraction",
  26. "Details":
  27.  
  28.  
  29. "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
  30. "Details":
  31.  
  32.  
  33. "Description": "NtSetInformationThread: attempt to hide thread from debugger",
  34. "Details":
  35.  
  36.  
  37. "Description": "Expresses interest in specific running processes",
  38. "Details":
  39.  
  40. "process": "System"
  41.  
  42.  
  43.  
  44.  
  45. "Description": "The binary likely contains encrypted or compressed data.",
  46. "Details":
  47.  
  48. "section": "name: .rsrc, entropy: 7.45, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00051200, virtual_size: 0x00051188"
  49.  
  50.  
  51. "section": "name: vlnnixzx, entropy: 7.31, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x001a4800, virtual_size: 0x001a5000"
  52.  
  53.  
  54. "section": "name: rxjpwgdg, entropy: 7.24, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00000200, virtual_size: 0x00001000"
  55.  
  56.  
  57.  
  58.  
  59. "Description": "Behavioural detection: Injection (Process Hollowing)",
  60. "Details":
  61.  
  62. "Injection": "HsErDyh.exe(940) -> HsErDyh.exe(3004)"
  63.  
  64.  
  65.  
  66.  
  67. "Description": "Executed a process and injected code into it, probably while unpacking",
  68. "Details":
  69.  
  70. "Injection": "HsErDyh.exe(940) -> HsErDyh.exe(3004)"
  71.  
  72.  
  73.  
  74.  
  75. "Description": "Behavioural detection: Injection (inter-process)",
  76. "Details":
  77.  
  78.  
  79. "Description": "Checks for the presence of known windows from debuggers and forensic tools",
  80. "Details":
  81.  
  82. "Window": "OLLYDBG"
  83.  
  84.  
  85. "Window": "GBDYLLO"
  86.  
  87.  
  88. "Window": "pediy06"
  89.  
  90.  
  91. "Window": "FilemonClass"
  92.  
  93.  
  94. "Window": "File Monitor - Sysinternals: www.sysinternals.com"
  95.  
  96.  
  97. "Window": "PROCMON_WINDOW_CLASS"
  98.  
  99.  
  100. "Window": "Process Monitor - Sysinternals: www.sysinternals.com"
  101.  
  102.  
  103. "Window": "RegmonClass"
  104.  
  105.  
  106. "Window": "Registry Monitor - Sysinternals: www.sysinternals.com"
  107.  
  108.  
  109. "Window": "18467-41"
  110.  
  111.  
  112.  
  113.  
  114. "Description": "The following process appear to have been packed with Themida: HsErDyh.exe",
  115. "Details":
  116.  
  117.  
  118. "Description": "Checks for the presence of known devices from debuggers and forensic tools",
  119. "Details":
  120.  
  121.  
  122. "Description": "Detects the presence of Wine emulator via registry key",
  123. "Details":
  124.  
  125.  
  126. "Description": "File has been identified by 31 Antiviruses on VirusTotal as malicious",
  127. "Details":
  128.  
  129. "FireEye": "Generic.mg.aad8c740d091d464"
  130.  
  131.  
  132. "McAfee": "Artemis!AAD8C740D091"
  133.  
  134.  
  135. "Malwarebytes": "Trojan.MalPack.AutoIt"
  136.  
  137.  
  138. "Alibaba": "Packed:Win32/Themida.4b0c23e1"
  139.  
  140.  
  141. "Cybereason": "malicious.3ae928"
  142.  
  143.  
  144. "Symantec": "ML.Attribute.HighConfidence"
  145.  
  146.  
  147. "ESET-NOD32": "MSIL/Agent.BXB"
  148.  
  149.  
  150. "APEX": "Malicious"
  151.  
  152.  
  153. "Avast": "Win32:Trojan-gen"
  154.  
  155.  
  156. "Kaspersky": "Trojan-PSW.Win32.Vidar.aut"
  157.  
  158.  
  159. "Paloalto": "generic.ml"
  160.  
  161.  
  162. "Tencent": "Win32.Trojan-qqpass.Qqrob.Lqey"
  163.  
  164.  
  165. "F-Secure": "Trojan.TR/PSW.Vidar.jleie"
  166.  
  167.  
  168. "DrWeb": "Trojan.Inject3.23881"
  169.  
  170.  
  171. "Invincea": "heuristic"
  172.  
  173.  
  174. "McAfee-GW-Edition": "Trojan-AitInject.aq"
  175.  
  176.  
  177. "Sophos": "Mal/Generic-S"
  178.  
  179.  
  180. "Avira": "TR/PSW.Vidar.jleie"
  181.  
  182.  
  183. "Microsoft": "Trojan:Win32/Wacatac.B!ml"
  184.  
  185.  
  186. "Endgame": "malicious (high confidence)"
  187.  
  188.  
  189. "AegisLab": "Trojan.Win32.Vidar.i!c"
  190.  
  191.  
  192. "ZoneAlarm": "Trojan-PSW.Win32.Vidar.aut"
  193.  
  194.  
  195. "AhnLab-V3": "Malware/Win32.Generic.C3447569"
  196.  
  197.  
  198. "Acronis": "suspicious"
  199.  
  200.  
  201. "TrendMicro-HouseCall": "Trojan.MSIL.ANTIVMC.USXVPHR19"
  202.  
  203.  
  204. "Rising": "Trojan.Obfus/Autoit!1.BB81 (CLASSIC)"
  205.  
  206.  
  207. "Ikarus": "Trojan-Spy.Azorult"
  208.  
  209.  
  210. "Fortinet": "AutoIt/Injector.EFY!tr"
  211.  
  212.  
  213. "AVG": "Win32:Trojan-gen"
  214.  
  215.  
  216. "CrowdStrike": "win/malicious_confidence_90% (W)"
  217.  
  218.  
  219. "Qihoo-360": "Win32/Trojan.PSW.0c5"
  220.  
  221.  
  222.  
  223.  
  224. "Description": "Checks the version of Bios, possibly for anti-virtualization",
  225. "Details":
  226.  
  227.  
  228. "Description": "Detects VirtualBox through the presence of a registry key",
  229. "Details":
  230.  
  231.  
  232. "Description": "Anomalous binary characteristics",
  233. "Details":
  234.  
  235. "anomaly": "Unprintable characters found in section name"
  236.  
  237.  
  238.  
  239.  
  240.  
  241. * Started Service:
  242.  
  243. * Mutexes:
  244. "DBWinMutex"
  245.  
  246.  
  247. * Modified Files:
  248. "\\??\\SICE",
  249. "\\??\\SIWVID",
  250. "\\??\\NTICE"
  251.  
  252.  
  253. * Deleted Files:
  254.  
  255. * Modified Registry Keys:
  256.  
  257. * Deleted Registry Keys:
  258.  
  259. * DNS Communications:
  260.  
  261. * Domains:
  262.  
  263. * Network Communication - ICMP:
  264.  
  265. * Network Communication - HTTP:
  266.  
  267. * Network Communication - SMTP:
  268.  
  269. * Network Communication - Hosts:
  270.  
  271. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement