Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
AV Detection: |
|
---|
Antivirus / Scanner detection for submitted sample |
Source: |
Avira: |
Antivirus or Machine Learning detection for unpacked file |
Source: |
Avira: |
Compliance: |
|
---|
Uses 32bit PE files |
Source: |
Static PE information: |
Source: |
Code function: |
0_2_004221FD | |
Source: |
Code function: |
0_2_00421E04 |
Software Vulnerabilities: |
|
---|
Found inlined nop instructions (likely shell or obfuscated code) |
Source: |
Code function: |
0_2_00403EF0 | |
Source: |
Code function: |
0_2_00403EF0 | |
Source: |
Code function: |
0_2_00401081 | |
Source: |
Code function: |
0_2_00403E90 | |
Source: |
Code function: |
0_2_00403E90 |
Networking: |
|
---|
Uses a known web browser user agent for HTTP communication |
Source: |
HTTP traffic detected: |
Detected TCP or UDP traffic on non-standard ports |
Source: |
TCP traffic: |
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
Source: |
Code function: |
0_2_10001509 |
Source: |
HTTP traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing: |
|
---|
Creates a DirectInput object (often for capturing keystrokes) |
Source: |
Binary or memory string: |
Potential key logger detected (key state polling based) |
Source: |
Code function: |
0_2_00427A90 | |
Source: |
Code function: |
0_2_00427AA5 | |
Source: |
Code function: |
0_2_00420D67 | |
Source: |
Code function: |
0_2_0041EDB2 |
E-Banking Fraud: |
|
---|
Checks if browser processes are running |
Source: |
Code function: |
0_2_100027CF |
System Summary: |
|
---|
Uses 32bit PE files |
Source: |
Static PE information: |
Contains functionality to shutdown / reboot the system |
Source: |
Code function: |
0_2_10001FB1 |
Detected potential crypto function |
Source: |
Code function: |
0_2_0041B240 | |
Source: |
Code function: |
0_2_004134B3 | |
Source: |
Code function: |
0_2_00416953 | |
Source: |
Code function: |
0_2_00401AE0 | |
Source: |
Code function: |
0_2_0041DF04 |
Found potential string decryption / allocating functions |
Source: |
Code function: |
Contains functionality to launch a process as a different user |
Source: |
Code function: |
0_2_10002EA2 |
Sample file is different than original file name gathered from version info |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
PE file contains strange resources |
Source: |
Static PE information: |
Tries to load missing DLLs |
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior |
Contains functionality to delete services |
Source: |
Code function: |
0_2_10002178 |
Source: |
Static PE information: |
Source: |
Key opened: |
Jump to behavior |
Source: |
Key value queried: |
Jump to behavior |
Source: |
File created: |
Jump to behavior |
Source: |
Classification label: |
Source: |
Code function: |
0_2_10004308 |
Source: |
Code function: |
0_2_00422F64 |
Source: |
Code function: |
0_2_10003EC4 |
Source: |
Code function: |
0_2_10003EC4 |
Source: |
Code function: |
0_2_00404050 |
Source: |
Mutant created: |
Source: |
Code function: |
0_2_0041B240 |
Data Obfuscation: |
|
---|
Uses code obfuscation techniques (call, push, ret) |
Source: |
Code function: |
0_2_0040E33E | |
Source: |
Code function: |
0_2_0040E9D6 | |
Source: |
Code function: |
0_2_10005C0A | |
Source: |
Code function: |
0_2_10005C4E |
Contains functionality to dynamically determine API calls |
Source: |
Code function: |
0_2_0041F585 |
Source: |
Code function: |
0_2_10003EC4 |
Hooking and other Techniques for Hiding and Protection: |
|
---|
Contains functionality to clear windows event logs (to hide its activities) |
Source: |
Code function: |
0_2_1000201D |
Contains functionality to check if a window is minimized (may be used to check if an application is visible) |
Source: |
Code function: |
0_2_00406182 | |
Source: |
Code function: |
0_2_004191A0 | |
Source: |
Code function: |
0_2_004189F0 | |
Source: |
Code function: |
0_2_00427B48 | |
Source: |
Code function: |
0_2_00423BA4 |
Extensive use of GetProcAddress (often used to hide API calls) |
Source: |
Code function: |
0_2_10004D19 |
Monitors certain registry keys / values for changes (often done to protect autostart functionality) |
Source: |
Registry key monitored for changes: |
Jump to behavior |
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior |
Malware Analysis System Evasion: |
|
---|
Found evasive API chain (may stop execution after checking mutex) |
Source: |
Evasive API call chain: |
Found decision node followed by non-executed suspicious APIs |
Source: |
Decision node followed by non-executed suspicious API: |
May sleep (evasive loops) to hinder dynamic analysis |
Source: |
Thread sleep count: |
Jump to behavior | ||
Source: |
Thread sleep time: |
Jump to behavior |
Found evasive API chain (date check) |
Source: |
Evasive API call chain: |
Sample execution stops while process was sleeping (likely an evasion) |
Source: |
Last function: |
||
Source: |
Last function: |
Found evasive API chain (may stop execution after accessing registry keys) |
Source: |
Evasive API call chain: |
Source: |
Process information queried: |
Jump to behavior |
Source: |
Code function: |
0_2_00403FA0 |
Source: |
Code function: |
0_2_004221FD | |
Source: |
Code function: |
0_2_00421E04 |
Source: |
API call chain: |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
Anti Debugging: |
|
---|
Contains functionality to dynamically determine API calls |
Source: |
Code function: |
0_2_0041F585 |
Contains functionality which may be used to detect a debugger (GetProcessHeap) |
Source: |
Code function: |
0_2_1000474B |
Contains functionality to read the PEB |
Source: |
Code function: |
0_2_00404100 |
Source: |
Code function: |
0_2_00411FCA | |
Source: |
Code function: |
0_2_00411FDC |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
Source: |
Code function: |
0_2_00403FE0 |
Source: |
Code function: |
0_2_00414C63 |
Source: |
Code function: |
0_2_004292E0 |
Lowering of HIPS / PFW / Operating System Security Settings: |
|
---|
AV process strings found (often used to terminate AV products) |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
Stealing of Sensitive Information: |
|
---|
Yara detected Young Lotus |
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
Remote Access Functionality: |
|
---|
Yara detected Young Lotus |
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
Contains functionality to open a port and listen for incoming connection (possibly a backdoor) |
Source: |
Code function: |
0_2_0042B665 | |
Source: |
Code function: |
0_2_00402920 |
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.224.169.155 | unknown | Netherlands | 132721 | PING-GLOBAL-ASPingGlobalAmsterdamPOPASNNL | false |
Private |
---|
IP |
---|
192.168.2.1 |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
|
unknown |