分析类型 | 虚拟机标签 | 开始时间 | 结束时间 | 持续时间 |
---|---|---|---|---|
文件 (Windows) | win7-sp1-x64-shaapp02-1 | 2024-03-27 13:31:46 | 2024-03-27 13:33:57 | 131 秒 |
文件名 | setup查看_6021.exe |
---|---|
文件大小 | 364552 字节 |
文件类型 | PE32+ executable (GUI) x86-64, for MS Windows |
MD5 | 3ab6e6daed14343b72fc89073d4dcb71 |
SHA1 | c1702727db9983d67035ab745d5eecb448cc24e8 |
SHA256 | a0cf1f2c6ab5027ec9e56207dfc1de8bdda10661a227a647af06df242548f7b8 |
SHA512 | c21efc0d08cc02cb349544119d6624f3ebc844091f3929c7c0867802b8e506155dd224b44d675dacc4df20568c95b92d31a17e5283084c83dfc3cb5f51facb26 |
CRC32 | AE0341FB |
Ssdeep | 6144:Z75ooZJSkklTC96EJeYW24TiG9qb1aCIaII8I2IIPIbIIEiIvxIqII4IBIPIIVIe:daoP1cqbbf |
Yara | 登录查看Yara规则 |
找不到该样本 提交误报 |
直接 | IP | 安全评级 | 地理位置 |
---|---|---|---|
否 | 43.129.30.239 | 日本 | |
是 | 8.134.141.179 | 美国 |
域名 | 安全评级 | 响应 |
---|---|---|
6021.anonymousrat8.com | 未知 | A 43.129.30.239 |
quick.anonymous.vin | 未知 | A 127.0.0.1 |
初始地址 | 0x140000000 |
---|---|
入口地址 | 0x140009a5c |
声明校验值 | 0x00055a18 |
实际校验值 | 0x00063795 |
最低操作系统版本要求 | 5.2 |
编译时间 | 2024-03-27 11:03:36 |
载入哈希 | d0c811fc99f1757a7a70a3b1bb6094e4 |
LegalCopyright | |
---|---|
InternalName | |
FileVersion | |
CompanyName | |
LegalTrademarks | |
Comments | |
ProductName | |
ProductVersion | |
FileDescription | |
OriginalFilename | |
Translation |
SHA1 | 时间戳 | 有效性 | 错误 |
---|---|---|---|
244ac68582b51e81fbca2b3bb80a7711b2203a72 | Thu Jan 09 14:27:43 2020 | WinVerifyTrust returned error 0x80096010 |
证书链 | Certificate Chain 1 |
发行给 | DigiCert Assured ID Root CA |
发行人 | DigiCert Assured ID Root CA |
有效期 | Mon Nov 10 080000 2031 |
SHA1 哈希 | 0563b8630d62d75abbc8ab1e4bdfb5a899b24d43 |
证书链 | Certificate Chain 2 |
发行给 | DigiCert Assured ID Code Signing CA-1 |
发行人 | DigiCert Assured ID Root CA |
有效期 | Tue Feb 10 200000 2026 |
SHA1 哈希 | 409aa4a74a0cda7c0fee6bd0bb8823d16b5f1875 |
证书链 | Certificate Chain 3 |
发行给 | SHENZHEN THUNDER NETWORKING TECHNOLOGIES LTD. |
发行人 | DigiCert Assured ID Code Signing CA-1 |
有效期 | Wed Jan 04 200000 2023 |
SHA1 哈希 | 0dc3fc827b30d8a6624e46cab7479605ef5c557c |
证书链 | Timestamp Chain 1 |
发行给 | GlobalSign Root CA |
发行人 | GlobalSign Root CA |
有效期 | Fri Jan 28 200000 2028 |
SHA1 哈希 | b1bc968bd4f49d622aa89a81f2150152a41d829c |
证书链 | Timestamp Chain 2 |
发行给 | GlobalSign Timestamping CA - G2 |
发行人 | GlobalSign Root CA |
有效期 | Fri Jan 28 200000 2028 |
SHA1 哈希 | c0e49d2d7d90a5cd427f02d9125694d5d6ec5b71 |
证书链 | Timestamp Chain 3 |
发行给 | GlobalSign TSA for MS Authenticode - G2 |
发行人 | GlobalSign Timestamping CA - G2 |
有效期 | Thu Jun 24 080000 2027 |
SHA1 哈希 | 63b82fab61f583909695050b00249c502933ec79 |
名称 | 虚拟地址 | 虚拟大小 | 原始数据大小 | 特征 | 熵(Entropy) |
---|---|---|---|---|---|
.text | 0x00001000 | 0x00025e42 | 0x00026000 | IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x00027000 | 0x0000a35a | 0x0000a400 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 4.74 |
.data | 0x00032000 | 0x000042e4 | 0x00001c00 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE | 2.97 |
.pdata | 0x00037000 | 0x0000267c | 0x00002800 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 5.25 |
.reloc | 0x0003a000 | 0x00000754 | 0x00000800 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ | 4.31 |
.rsrc | 0x0003b000 | 0x000204b8 | 0x00020600 | IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ | 5.05 |
直接 | IP | 安全评级 | 地理位置 |
---|---|---|---|
否 | 43.129.30.239 | 日本 | |
是 | 8.134.141.179 | 美国 |
源地址 | 源端口 | 目标地址 | 目标端口 |
---|---|---|---|
192.168.122.201 | 49161 | 23.206.229.165 | 80 |
192.168.122.201 | 49169 | 43.129.30.239 6021.anonymousrat8.com | 6666 |
192.168.122.201 | 49170 | 43.129.30.239 6021.anonymousrat8.com | 6666 |
192.168.122.201 | 49171 | 43.129.30.239 6021.anonymousrat8.com | 6666 |
192.168.122.201 | 49201 | 43.129.30.239 6021.anonymousrat8.com | 6666 |
192.168.122.201 | 49160 | 8.134.141.179 | 80 |
192.168.122.201 | 49162 | 8.134.141.179 | 80 |
192.168.122.201 | 49163 | 8.134.141.179 | 80 |
源地址 | 源端口 | 目标地址 | 目标端口 |
---|---|---|---|
192.168.122.201 | 53118 | 192.168.122.1 | 53 |
192.168.122.201 | 57526 | 192.168.122.1 | 53 |
192.168.122.201 | 60155 | 192.168.122.1 | 53 |
192.168.122.201 | 63246 | 192.168.122.1 | 53 |
192.168.122.201 | 63472 | 192.168.122.1 | 53 |
域名 | 安全评级 | 响应 |
---|---|---|
6021.anonymousrat8.com | 未知 | A 43.129.30.239 |
quick.anonymous.vin | 未知 | A 127.0.0.1 |
源地址 | 源端口 | 目标地址 | 目标端口 |
---|---|---|---|
192.168.122.201 | 49161 | 23.206.229.165 | 80 |
192.168.122.201 | 49169 | 43.129.30.239 6021.anonymousrat8.com | 6666 |
192.168.122.201 | 49170 | 43.129.30.239 6021.anonymousrat8.com | 6666 |
192.168.122.201 | 49171 | 43.129.30.239 6021.anonymousrat8.com | 6666 |
192.168.122.201 | 49201 | 43.129.30.239 6021.anonymousrat8.com | 6666 |
192.168.122.201 | 49160 | 8.134.141.179 | 80 |
192.168.122.201 | 49162 | 8.134.141.179 | 80 |
192.168.122.201 | 49163 | 8.134.141.179 | 80 |
源地址 | 源端口 | 目标地址 | 目标端口 |
---|---|---|---|
192.168.122.201 | 53118 | 192.168.122.1 | 53 |
192.168.122.201 | 57526 | 192.168.122.1 | 53 |
192.168.122.201 | 60155 | 192.168.122.1 | 53 |
192.168.122.201 | 63246 | 192.168.122.1 | 53 |
192.168.122.201 | 63472 | 192.168.122.1 | 53 |
URI | HTTP数据 |
---|---|
URL专业沙箱检测 -> http://8.134.141.179/1179 | GET /1179 HTTP/1.1 Connection: Keep-Alive User-Agent: huorong Host: 8.134.141.179 |
URL专业沙箱检测 -> http://acroipm.adobe.com/11/rdr/CHS/win/nooem/none/message.zip | GET /11/rdr/CHS/win/nooem/none/message.zip HTTP/1.1 Accept: */* If-Modified-Since: Mon, 08 Nov 2017 08:44:36 GMT User-Agent: IPM Host: acroipm.adobe.com Connection: Keep-Alive Cache-Control: no-cache |
URL专业沙箱检测 -> http://8.134.141.179/wj-1179.txt | GET /wj-1179.txt HTTP/1.1 User-Agent: RookIE/1.0 Host: 8.134.141.179 |
URL专业沙箱检测 -> http://8.134.141.179/wj/6021_64.bin | GET /wj/6021_64.bin HTTP/1.1 User-Agent: RookIE/1.0 Host: 8.134.141.179 |
URL专业沙箱检测 -> http://8.134.141.179/wj/1.exe | GET /wj/1.exe HTTP/1.1 User-Agent: RookIE/1.0 Host: 8.134.141.179 |
URL专业沙箱检测 -> http://8.134.141.179/wj/1.dll | GET /wj/1.dll HTTP/1.1 User-Agent: RookIE/1.0 Host: 8.134.141.179 |
URL专业沙箱检测 -> http://8.134.141.179/wj/quick.exe | GET /wj/quick.exe HTTP/1.1 User-Agent: RookIE/1.0 Host: 8.134.141.179 |
URL专业沙箱检测 -> http://8.134.141.179/wj/qq.exe | GET /wj/qq.exe HTTP/1.1 User-Agent: RookIE/1.0 Host: 8.134.141.179 |
无SMTP流量.
无IRC请求.
无ICMP流量.
无 CIF 结果
Timestamp | Source IP | Source Port | Destination IP | Destination Port | Protocol | SID | Signature | Category |
---|---|---|---|---|---|---|---|---|
2024-03-27 13:32:09.017781+0800 | 192.168.122.201 | 49162 | 8.134.141.179 | 80 | TCP | 2003635 | ET TROJAN Generic Password Stealer User Agent Detected (RookIE) | A Network Trojan was detected |
2024-03-27 13:32:16.876095+0800 | 192.168.122.201 | 49163 | 8.134.141.179 | 80 | TCP | 2003635 | ET TROJAN Generic Password Stealer User Agent Detected (RookIE) | A Network Trojan was detected |
2024-03-27 13:32:16.876095+0800 | 192.168.122.201 | 49163 | 8.134.141.179 | 80 | TCP | 2018752 | ET TROJAN Generic .bin download from Dotted Quad | A Network Trojan was detected |
2024-03-27 13:32:17.236604+0800 | 192.168.122.201 | 49163 | 8.134.141.179 | 80 | TCP | 2003635 | ET TROJAN Generic Password Stealer User Agent Detected (RookIE) | A Network Trojan was detected |
2024-03-27 13:32:17.236604+0800 | 192.168.122.201 | 49163 | 8.134.141.179 | 80 | TCP | 2018581 | ET TROJAN Single char EXE direct download likely trojan (multiple families) | A Network Trojan was detected |
2024-03-27 13:32:17.307450+0800 | 8.134.141.179 | 80 | 192.168.122.201 | 49163 | TCP | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
2024-03-27 13:32:18.343144+0800 | 192.168.122.201 | 49163 | 8.134.141.179 | 80 | TCP | 2003635 | ET TROJAN Generic Password Stealer User Agent Detected (RookIE) | A Network Trojan was detected |
2024-03-27 13:32:19.364169+0800 | 192.168.122.201 | 49163 | 8.134.141.179 | 80 | TCP | 2003635 | ET TROJAN Generic Password Stealer User Agent Detected (RookIE) | A Network Trojan was detected |
2024-03-27 13:32:30.251664+0800 | 192.168.122.201 | 49169 | 43.129.30.239 | 6666 | TCP | 2260003 | SURICATA Applayer Protocol detection skipped | Generic Protocol Command Decode |
2024-03-27 13:32:21.232980+0800 | 192.168.122.201 | 49163 | 8.134.141.179 | 80 | TCP | 2003635 | ET TROJAN Generic Password Stealer User Agent Detected (RookIE) | A Network Trojan was detected |
2024-03-27 13:32:21.232980+0800 | 192.168.122.201 | 49163 | 8.134.141.179 | 80 | TCP | 2019714 | ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile | Potentially Bad Traffic |
2024-03-27 13:32:21.447753+0800 | 192.168.122.201 | 49163 | 8.134.141.179 | 80 | TCP | 2003635 | ET TROJAN Generic Password Stealer User Agent Detected (RookIE) | A Network Trojan was detected |
2024-03-27 13:32:21.447753+0800 | 192.168.122.201 | 49163 | 8.134.141.179 | 80 | TCP | 2018581 | ET TROJAN Single char EXE direct download likely trojan (multiple families) | A Network Trojan was detected |
2024-03-27 13:32:22.124791+0800 | 192.168.122.201 | 49163 | 8.134.141.179 | 80 | TCP | 2003635 | ET TROJAN Generic Password Stealer User Agent Detected (RookIE) | A Network Trojan was detected |
No TLS
No Suricata HTTP
HTML 总结报告 (需15-60分钟同步) |
下载 |
---|
Task ID | 743105 |
---|---|
Mongo ID | 6603b063dc327bb8978bebe5 |
Cuckoo release | 1.4-Maldun |