Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 21, 2024, 1:39 p.m. | Oct. 21, 2024, 1:44 p.m. |
-
-
rfusclient.exe "C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\rfusclient.exe" -run_agent
2668-
rutserv.exe "C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\rutserv.exe"
2736
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
smtp-5.1gb.ua | 195.234.4.4 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\InstallDate |
packer | UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser |
resource name | UNICODEDATA |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\webmmux.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\rutserv.exe |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\webmvorbisencoder.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\ssleay32.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\rfusclient.exe |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\libeay32.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\vp8encoder.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\webmvorbisdecoder.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\vp8decoder.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\rfusclient.exe |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\rutserv.exe |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\libeay32.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\vp8decoder.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\vp8encoder.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\webmmux.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\rfusclient.exe |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\webmvorbisdecoder.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\webmvorbisencoder.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\ssleay32.dll |
file | C:\Users\test22\AppData\Roaming\RMS Agent\69110\86337C6FA9\rutserv.exe |
section | {u'size_of_data': u'0x000e5400', u'virtual_address': u'0x00cbb000', u'entropy': 7.9166279623924485, u'name': u'UPX1', u'virtual_size': u'0x000e6000'} | entropy | 7.91662796239 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x009f7600', u'virtual_address': u'0x00da1000', u'entropy': 7.954909631861527, u'name': u'.rsrc', u'virtual_size': u'0x009f8000'} | entropy | 7.95490963186 | description | A section with a high entropy has been found | |||||||||
entropy | 1.0 | description | Overall entropy of this PE file is high |
url | http://schemas.xmlsoap.org/soap/envelope/ |
url | http://rmansys.ru/internet-id/ |
description | Create a windows service | rule | Create_Service | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Communications smtp | rule | network_smtp_raw | ||||||
description | Communications over SSL | rule | Network_SSL | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Detection of Virtual Appliances through the use of WMI for use of evasion. | rule | WMI_VM_Detect | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Install itself for autorun at Windows startup | rule | Persistence | ||||||
description | Run a KeyLogger | rule | KeyLogger |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
host | 89.184.66.94 |
process: potential process injection target | csrss.exe |
dead_host | 89.184.66.94:5655 |
Bkav | W32.AIDetectMalware |
Lionic | Riskware.Win32.RemoteUtilities.1!c |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win32.Generic.vc |
ALYac | Application.Generic.3808827 |
Cylance | Unsafe |
VIPRE | Application.Generic.3808827 |
Sangfor | Tool.Win32.Remoteutilities.Vooi |
CrowdStrike | win/grayware_confidence_90% (D) |
BitDefender | Application.Generic.3808827 |
K7GW | Unwanted-Program ( 00578aef1 ) |
K7AntiVirus | Unwanted-Program ( 00578aef1 ) |
Arcabit | Application.Generic.D3A1E3B |
Paloalto | generic.ml |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/RemoteAdmin.RemoteUtilities.W potentially unsafe |
Avast | Win32:Malware-gen |
Kaspersky | not-a-virus:RemoteAdmin.Win32.RemoteUtilities.fx |
NANO-Antivirus | Riskware.Win32.RemoteControl.jraccs |
MicroWorld-eScan | Application.Generic.3808827 |
Rising | Hacktool.RemoteUtilities!8.49C (CLOUD) |
Emsisoft | Application.Generic.3808827 (B) |
F-Secure | Trojan.TR/AVI.Agent.imskk |
DrWeb | Tool.RemoteControl.20 |
McAfeeD | ti!6FB6CFFBC9D3 |
CTX | exe.remote-access-trojan.generic |
Sophos | Generic Reputation PUA (PUA) |
FireEye | Generic.mg.fec6019b90092723 |
Avira | TR/AVI.Agent.imskk |
Antiy-AVL | RiskWare[RemoteAdmin]/Win32.RMS |
Gridinsoft | Backdoor.Win32.Gen.tr |
ZoneAlarm | not-a-virus:RemoteAdmin.Win32.RemoteUtilities.fx |
GData | Application.Generic.3808827 |
Varist | W32/ABApplication.GMLQ-4863 |
McAfee | Artemis!FEC6019B9009 |
VBA32 | Backdoor.RABased |
Malwarebytes | RiskWare.RemoteManipulator |
Tencent | Win32.Trojan.Remoteutilities.Gkjl |
MaxSecure | Trojan.Malware.218267050.susgen |
Fortinet | Riskware/RemoteAdmin_RemoteUtilities |
AVG | Win32:Malware-gen |
alibabacloud | Backdoor[rat]:Win/RemoteAdmin.RynbpzAQBNHNGtN |