Report #687 check_circle

  • Creation Date: Oct. 19, 2019, 2:21 a.m.
  • Last Update: Oct. 19, 2019, 5:21 a.m.
  • File: 035
  • Results:
Binary
DLL
False cancel
Size
1.09MB
trid
22.3% InstallShield setup
21.5% Win32 EXE PECompact compressed
14.3% Win64 Executable
14.0% UPX compressed Win32 Executable
13.7% Win32 EXE Yoda's Crypter
type
PE
wordsize
32
Subsystem
Windows CLI
Hashes
md5
e5e21320ed5fb45cbb0a2cbd662e28e8
sha1
7e68c42037433a785c70b1ded4c47b06ab90743a
crc32
0xf5f7ae3d
sha224
4450a2752dffaaf1a0daa8ebd9a56d8d7f06e0f1c2a63da68307f74b
sha256
86f3056a8b2130fe25930568d9485905f537704b7eb911ad9d2fe67228759ebd
sha384
ff1d3a5792faf5f84e131e6d999775e08b48e22b4781bb6148fd6ca93d436b3b4e665ecd62711957fa0f03a34c2b0799
sha512
ddb96157cb465637f01f5ac0dc49fe45afc414b2c5c1cc5991849898ab2fa261b1c6cfc17cb58be05a85d73645768ae613270ae6b1e20cd8b1b498b37d815e1f
ssdeep
24576:wWOIqgxr/nIiYWMf9dQnPoY20k0XgBq/bPEUpPhOZy+hz7FFUj9SD+sw4LOTc:sgxr/nIiYWMf9dQnPoY20k0XgBq/bPEn
Community
Google
True check_circle
HashLib
False cancel
YARA
Matches
domain, UPX20030XMarkusOberhumerLaszloMolnarJohnReiser, IP, win_private_profile, Dropper_Strings, Intel_Virtualization_Wizard_exe, HasDebugData, network_dropper, BASE64_table, escalate_priv, HasRichSignature, possible_includes_base64_packed_functions, Borland, VC8_Microsoft_Corporation, DebuggerException__SetConsoleCtrl, network_dns, spreading_share, IsConsole, create_service, UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser, cred_local, win_files_operation, IsPE32, win_hook, disable_dep, contentis_base64, network_tcp_socket, SEH__vectored, screenshot, win_token, win_mutex, keylogger, UPXv20MarkusLaszloReiser, Misc_Suspicious_Strings, xtreme_rat, UPX, migrate_apc, antisb_threatExpert, DebuggerHiding__Thread, anti_dbg, network_tcp_listen, DebuggerCheck__QueryInfo, url, Microsoft_Visual_Cpp_8, win_registry, Typical_Malware_String_Transforms, HasOverlay, network_dga, Advapi_Hash_API, Big_Numbers5, create_com_service, Big_Numbers0

Suspicious
True check_circle

Strings
List
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
</dc:rights></rdf:Description><rdf:Description rdf:about="uuid:faf5bdd5-ba3d-11da-ad31-d33d75182f1b" xmlns:tiff="http://ns.adobe.com/tiff/1.0/"/><rdf:Description rdf:about="uuid:faf5bdd5-ba3d-11da-ad31-d33d75182f1b" xmlns:exif="http://ns.adobe.com/exif/1.0/"/></rdf:RDF></x:xmpmeta>
</dc:rights></rdf:Description><rdf:Description rdf:about="uuid:faf5bdd5-ba3d-11da-ad31-d33d75182f1b" xmlns:tiff="http://ns.adobe.com/tiff/1.0/"/><rdf:Description rdf:about="uuid:faf5bdd5-ba3d-11da-ad31-d33d75182f1b" xmlns:exif="http://ns.adobe.com/exif/1.0/"/></rdf:RDF></x:xmpmeta>
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:pdf="http://ns.adobe.com/pdf/1.3/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:xap="http://ns.adobe.com/xap/1.0/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:tiff="http://ns.adobe.com/tiff/1.0/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:b1be9614-923d-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:df90b7af-923d-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:880b6202-923d-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:c8e53c53-923d-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:9ec20a53-923d-11dc-bf0f-889ae1191ecf" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:6f03c386-7819-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:cf09c8e3-7814-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:70e4755a-7818-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:b58a55db-7817-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:70e47554-7818-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:exif="http://ns.adobe.com/exif/1.0/">
<rdf:Description rdf:about="uuid:0bbddd7d-7818-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
<rdf:Description rdf:about="uuid:0bbddd83-7818-11dc-b3b7-80a45141ec24" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/">
qhttp://ns.adobe.com/xap/1.0/
qhttp://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
=http://ns.adobe.com/xap/1.0/
<rdf:Description rdf:about="uuid:1acf7d56-923e-11dc-bf0f-889ae1191ecf" xmlns:dc="http://purl.org/dc/elements/1.1/">
<dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
<dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
<dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
<dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>

Foremost
Matches
0.exe, 41 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: False cancel
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

Files
Allowed: user32.dll, MSVCR110.dll, zURLMON.DLL, oleaut32.dll, ntdll.dll, shlwapi.dll, wininet.dll, advapi32.dll, KERNEL32.DLL, shell32.dll, URLMON.DLL
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 39424
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 4096
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .rdata, .data, .rsrc, .reloc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 6
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 6
Linker
Version: 11.0
Suspicious: False cancel
Subsystem
Version: 6.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 4951
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, oleaut32.dll, ntdll.dll, shlwapi.dll, wininet.dll, advapi32.dll, kernel32.dll, shell32.dll, urlmon.dll
hasLibs: True check_circle
Suspicious: msvcr110.dll, zurlmon.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2019-08-28 13:25:38
Future: False cancel

Compilation
Packed: False cancel
Missing: False cancel
Packers
Compiled: True check_circle
Compilers: Microsoft Visual C++ 8, VC8 -> Microsoft Corporation

Obfuscation
XOR: True check_circle
Fuzzing: False cancel

PEDetector
Matches
6304
Suspicious
True check_circle
Disassembly
hasTricks
True check_circle
Tricks
pushret
.rsrc: 11
.text: 1

nopsequence
.rsrc: 1

pushpopmath
.rsrc: 11

garbagebytes
.rsrc: 6
.text: 1

programcontrolflowchange
.rsrc: 6
.text: 1

cpuinstructionsresultscomparison
.rdata: 1

AVclass
xtrat
1
VirusTotal
md5
e5e21320ed5fb45cbb0a2cbd662e28e8
sha1
7e68c42037433a785c70b1ded4c47b06ab90743a
SCANS
AVG
result: Win32:Malware-gen
update: 20190912
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20190321
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=86)
update: 20190912
version: 2018.9.12.1
detected: True check_circle

APEX
result: Malicious
update: 20190910
version: 5.62
detected: True check_circle

K7GW
result: P2PWorm ( 00294b0b1 )
update: 20190911
version: 11.66.31978
detected: True check_circle

ALYac
result: Trojan.Delf.Agent.AH
update: 20190912
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Malware-gen
update: 20190912
version: 18.4.3895.0
detected: True check_circle

Avira
result: BDS/Backdoor.Gen5
update: 20190912
version: 8.3.3.8
detected: True check_circle

Baidu
result: Win32.Backdoor.Agent.ag
update: 20190318
version: 1.0.0.2
detected: True check_circle

Cyren
result: W32/Xtrat.A.gen!Eldorado
update: 20190912
version: 6.2.0.1
detected: True check_circle

DrWeb
result: BackDoor.Siggen.52725
update: 20190912
version: 7.0.41.7240
detected: True check_circle

GData
result: Trojan.Delf.Agent.AH
update: 20190912
version: A:25.23353B:26.16009
detected: True check_circle

Panda
result: Trj/CI.A
update: 20190911
version: 4.6.4.2
detected: True check_circle

VBA32
result: BScope.Backdoor.Xtreme
update: 20190911
version: 4.0.0
detected: True check_circle

Zoner
update: 20190911
version: 1.0.0.1
detected: False cancel

ClamAV
result: Win.Trojan.Agent-36788
update: 20190911
version: 0.101.4.0
detected: True check_circle

Comodo
update: 20190912
version: 31462
detected: False cancel

F-Prot
result: W32/Xtrat.A.gen!Eldorado
update: 20190912
version: 4.7.1.166
detected: True check_circle

Ikarus
result: Worm.Win32.AutoRun
update: 20190911
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!E5E21320ED5F
update: 20190912
version: 6.0.6.653
detected: True check_circle

Rising
result: Backdoor.Xtrat!1.6A25 (TFE:5:O0r80Ep3LQC)
update: 20190912
version: 25.0.0.24
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20190912
version: 4.98.0
detected: True check_circle

Yandex
result: TrojanSpy.KeyLogger!lMot+l5e4hg
update: 20190910
version: 5.5.2.24
detected: True check_circle

Zillya
update: 20190911
version: 2.0.0.3898
detected: False cancel

Acronis
update: 20190904
version: 1.1.1.56
detected: False cancel

Alibaba
result: Backdoor:Win32/Xtreme.566bad35
update: 20190527
version: 0.3.0.5
detected: True check_circle

Arcabit
result: Trojan.Delf.Agent.AH
update: 20190912
version: 1.0.0.856
detected: True check_circle

Cylance
result: Unsafe
update: 20190912
version: 2.3.1.101
detected: True check_circle

Endgame
update: 20190819
version: 3.0.14
detected: False cancel

FireEye
result: Trojan.Delf.Agent.AH
update: 20190912
version: 29.7.0.0
detected: True check_circle

TACHYON
update: 20190912
version: 2019-09-12.02
detected: False cancel

Tencent
result: Trojan.Win32.Injector.r
update: 20190912
version: 1.0.0.1
detected: True check_circle

ViRobot
result: Trojan.Win32.Z.Xtreme.1141358
update: 20190911
version: 2014.3.20.0
detected: True check_circle

Webroot
update: 20190912
version: 1.0.0.403
detected: False cancel

eGambit
result: Trojan.Generic
update: 20190912
version: v5.0.5
detected: True check_circle

Ad-Aware
result: Trojan.Delf.Agent.AH
update: 20190912
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Trojan.Win32.Xtreme.m!c
update: 20190912
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.Delf.Agent.AH (B)
update: 20190912
version: 2018.12.0.1641
detected: True check_circle

F-Secure
result: Backdoor.BDS/Backdoor.Gen5
update: 20190912
version: 12.0.86.52
detected: True check_circle

Fortinet
result: W32/Xtreme.BQJ!tr.bdr
update: 20190912
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20190904
version: 6.3.6.26157
detected: False cancel

Jiangmin
update: 20190912
version: 16.0.100
detected: False cancel

Kingsoft
update: 20190912
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20190912
version: 1.0
detected: True check_circle

Symantec
result: ML.Attribute.HighConfidence
update: 20190912
version: 1.10.0.0
detected: True check_circle

Trapmine
update: 20190826
version: 3.1.81.800
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Xtrat.C3450632
update: 20190911
version: 3.16.1.25089
detected: True check_circle

Antiy-AVL
result: Trojan[Backdoor]/Win32.Xtreme.bqj
update: 20190912
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Backdoor.Win32.Xtreme.bqj
update: 20190912
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Backdoor:Win32/Xtrat.A
update: 20190912
version: 1.1.16300.1
detected: True check_circle

Qihoo-360
result: Win32/Backdoor.dcd
update: 20190912
version: 1.0.0.1120
detected: True check_circle

ZoneAlarm
result: Backdoor.Win32.Xtreme.bqj
update: 20190912
version: 1.0
detected: True check_circle

Cybereason
result: malicious.0ed5fb
update: 20190616
version: 1.2.449
detected: True check_circle

ESET-NOD32
result: Win32/AutoRun.Remtasu.E
update: 20190912
version: 20005
detected: True check_circle

TrendMicro
result: TSPY_KEYLOG.SMC
update: 20190912
version: 11.0.0.1006
detected: True check_circle

BitDefender
result: Trojan.Delf.Agent.AH
update: 20190912
version: 7.2
detected: True check_circle

CrowdStrike
result: win/malicious_confidence_60% (W)
update: 20190702
version: 1.0
detected: True check_circle

K7AntiVirus
result: P2PWorm ( 00294b0b1 )
update: 20190912
version: 11.66.31985
detected: True check_circle

SentinelOne
result: DFI - Malicious PE
update: 20190807
version: 1.0.31.22
detected: True check_circle

Avast-Mobile
update: 20190911
version: 190911-02
detected: False cancel

Malwarebytes
update: 20190912
version: 2.1.1.1115
detected: False cancel

TotalDefense
result: Win32/Sipay.ADC
update: 20190912
version: 37.1.62.1
detected: True check_circle

CAT-QuickHeal
result: Backdoor.Xtrat.AA8
update: 20190909
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Sasfis.dzcfs
update: 20190912
version: 1.0.134.24859
detected: True check_circle

MicroWorld-eScan
result: Trojan.Delf.Agent.AH
update: 20190912
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20190906
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Generic.tm
update: 20190911
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
result: TSPY_KEYLOG.SMC
update: 20190912
version: 10.0.0.1040
detected: True check_circle

total
68
sha256
86f3056a8b2130fe25930568d9485905f537704b7eb911ad9d2fe67228759ebd
scan_id
86f3056a8b2130fe25930568d9485905f537704b7eb911ad9d2fe67228759ebd-1568271585
resource
e5e21320ed5fb45cbb0a2cbd662e28e8
positives
53
scan_date
2019-09-12 06:59:45
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Windows\SysWOW64\apphelp.dll
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Windows\SysWOW64\apphelp.dll
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Windows\AppPatch\sysmain.sdb
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Monitor
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\Monitor
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Monitor
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\Monitor
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Monitor
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\Monitor
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Read1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Monitor\ui\SwDRM.dll
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Open1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\Monitor\proc.exe
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\Windows
19/10/2019 - 4:45:43.590Unknown1480C:\malware.exeC:\Monitor
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows\Prefetch\PROC.EXE-5509F567.pf
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows\System32\wow64.dll
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows\System32\wow64.dll
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows\System32\wow64win.dll
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows\System32\wow64win.dll
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows\System32\wow64cpu.dll
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows\System32\wow64cpu.dll
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows\System32\wow64log.dll
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows
19/10/2019 - 4:45:43.606Unknown1488C:\Monitor\proc.exeC:\Windows
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Monitor
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\sechost.dll
19/10/2019 - 4:45:43.606Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\sechost.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Monitor\version.DLL
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\version.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\version.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\imm32.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\imm32.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\imm32.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\imm32.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\imm32.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\imm32.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\Globalization\Sorting\SortDefault.nls
19/10/2019 - 4:45:43.622Unknown1488C:\Monitor\proc.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Roaming
19/10/2019 - 4:45:43.622Unknown1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Roaming
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\rpcss.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\rpcss.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\uxtheme.dll
19/10/2019 - 4:45:43.622Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\uxtheme.dll
19/10/2019 - 4:45:43.715Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\shell32.dll
19/10/2019 - 4:45:43.715Open1488C:\Monitor\proc.exeC:\Monitor\proc.exe.Local
19/10/2019 - 4:45:43.715Open1488C:\Monitor\proc.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
19/10/2019 - 4:45:43.715Unknown1488C:\Monitor\proc.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
19/10/2019 - 4:45:43.715Open1488C:\Monitor\proc.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
19/10/2019 - 4:45:43.715Open1488C:\Monitor\proc.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
19/10/2019 - 4:45:43.715Open1488C:\Monitor\proc.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
19/10/2019 - 4:45:43.715Open1488C:\Monitor\proc.exeC:\Windows\WindowsShell.Manifest
19/10/2019 - 4:45:43.715Unknown1488C:\Monitor\proc.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\propsys.dll
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\propsys.dll
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Caches
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Caches
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000000.db
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\desktop.ini
19/10/2019 - 4:45:43.731Read1488C:\Monitor\proc.exeC:\Users\desktop.ini
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Users
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Users\Behemot
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Users\Behemot\AppData
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\Desktop\desktop.ini
19/10/2019 - 4:45:43.731Read1488C:\Monitor\proc.exeC:\Users\Behemot\Desktop\desktop.ini
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Users\Behemot\Desktop\desktop.ini
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Temp\x.html
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Temp\x.htmlx.html
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Temp\x.html
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Temp\x.htmlx.html
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Temp
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Temp
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Temp\x.html
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Temp\x.htmlx.html
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Program Files\Internet Explorer\iexplore.exe
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Temp\x.html
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Monitor\Files\DeletedFiles\x.html
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Monitor\Files\DeletedFiles\x.htmlx.html
19/10/2019 - 4:45:43.731Delete1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Temp\x.htmlx.html
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Users\Behemot\AppData\Local\Temp\x.htmlx.html
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Program
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Program.exe
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Program Files\Internet
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Program Files\Internet.exe
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Program Files\Internet Explorer\iexplore.exe
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Program Files\Internet Explorer\iexplore.exe
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Program Files\Internet Explorer\iexplore.exe
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\apphelp.dll
19/10/2019 - 4:45:43.731Open1488C:\Monitor\proc.exeC:\Windows\SysWOW64\apphelp.dll
19/10/2019 - 4:45:43.731Unknown1488C:\Monitor\proc.exeC:\Program Files\Internet Explorer\iexplore.exe
19/10/2019 - 4:45:43.997Unknown1488C:\Monitor\proc.exeC:\Windows
19/10/2019 - 4:45:43.997Unknown1488C:\Monitor\proc.exeC:\Monitor
19/10/2019 - 4:45:43.997Unknown1488C:\Monitor\proc.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d

Process
Trace
19/10/2019 - 4:45:43.590Create1480C:\malware.exe1488C:\Monitor\proc.exe
19/10/2019 - 4:45:43.731Create1488C:\Monitor\proc.exe2412C:\Program Files\Internet Explorer\iexplore.exe
19/10/2019 - 4:45:43.997Terminate1480C:\malware.exe1488C:\Monitor\proc.exe

Analysis
Reason
Finished

Status
Sucessfully Executed

Results
1

Registry
Trace
19/10/2019 - 4:45:43.622Write1488C:\Monitor\proc.exeHKCU\Software\XtremeRATMutex

File Summary
Created
Identified: False cancel

Deleted
Identified: True check_circle

Process Summary
Created
Identified: True check_circle

Deleted
Identified: True check_circle

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: False cancel

Browsers
Identified: False cancel

Internet
Identified: False cancel

Loading...

DNS
Query

Response

TCP
Info

UDP
Info

HTTP
Info

Summary
DNS
False cancel

TCP
False cancel

UDP
False cancel

HTTP
False cancel

Results
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: False cancel
Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle
SVC (Kernel=Linear, NFS-BRMalware)
confidence: 94.82%
suspicious: False cancel
Random Forest (100 estimators, NFS-BRMalware)
confidence: 64.00%
suspicious: False cancel
Add to Collection
Download