Malware Analysis Report

2025-08-10 23:56

Sample ID 240314-l7bedshc5s
Target c85b31af8094b90c7be07806660ac376
SHA256 39cc615c845071753a2eacc24b6e26a1d14b8fd1b3bb7f6fc6ccf41a3dc1ffad
Tags
ramnit banker spyware stealer trojan upx worm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

39cc615c845071753a2eacc24b6e26a1d14b8fd1b3bb7f6fc6ccf41a3dc1ffad

Threat Level: Known bad

The file c85b31af8094b90c7be07806660ac376 was found to be: Known bad.

Malicious Activity Summary

ramnit banker spyware stealer trojan upx worm

Ramnit

UPX packed file

Loads dropped DLL

Program crash

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-03-14 10:09

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-03-14 10:09

Reported

2024-03-14 10:12

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c85b31af8094b90c7be07806660ac376.exe"

Signatures

Ramnit

trojan spyware stealer worm banker ramnit

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\c85b31af8094b90c7be07806660ac376.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c85b31af8094b90c7be07806660ac376.exe

"C:\Users\Admin\AppData\Local\Temp\c85b31af8094b90c7be07806660ac376.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4964 -ip 4964

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 528

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 202.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 100.5.17.2.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 178.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 17.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 210.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 50.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 204.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
GB 96.17.178.204:80 tcp

Files

memory/4964-0-0x0000000000400000-0x0000000000423000-memory.dmp

memory/4964-1-0x0000000000400000-0x0000000000423000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\~TM517B.tmp

MD5 4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1 e16506f662dc92023bf82def1d621497c8ab5890
SHA256 767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA512 9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

memory/4964-3-0x0000000002030000-0x0000000002053000-memory.dmp

memory/4964-7-0x00000000779A2000-0x00000000779A4000-memory.dmp

memory/4964-6-0x00000000779A2000-0x00000000779A3000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-14 10:09

Reported

2024-03-14 10:12

Platform

win7-20240221-en

Max time kernel

122s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c85b31af8094b90c7be07806660ac376.exe"

Signatures

Ramnit

trojan spyware stealer worm banker ramnit

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c85b31af8094b90c7be07806660ac376.exe

"C:\Users\Admin\AppData\Local\Temp\c85b31af8094b90c7be07806660ac376.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 148

Network

N/A

Files

memory/2020-0-0x0000000000400000-0x0000000000423000-memory.dmp

memory/2020-1-0x0000000000400000-0x0000000000423000-memory.dmp

memory/2020-2-0x00000000001B0000-0x00000000001D3000-memory.dmp

memory/2020-6-0x000000007764F000-0x0000000077651000-memory.dmp

\Users\Admin\AppData\Local\Temp\~TM64EB.tmp

MD5 af6fcadd27b5bf2ae70f1ac20b9f4038
SHA1 dd1cb493955e5d45ae90529da49b60e6144a4b21
SHA256 533a82ca36d11a8863dd2b7b59ab220276d9de03e1ef0184ba2012c159b255c1
SHA512 59a32c3ea0796c2b0b5cd6852403ad10f0596d28524208f6e70f4e9fa87d547315d76ebe052f1201d1bbc1b65781b5f2dc6ee6e0fecaa70a3dc0c14cdb1f7b12

memory/2020-9-0x0000000077650000-0x0000000077652000-memory.dmp

memory/2020-8-0x0000000077650000-0x0000000077651000-memory.dmp

\Users\Admin\AppData\Local\Temp\~TM6549.tmp

MD5 e5ecbd6395de61fe1371026101941074
SHA1 e100fc54053857eeae27300e39a5cf925ab2768b
SHA256 28d715f946bf035ddad8012911bc974fe09c32d844de8fb50a327bd264bbafaf
SHA512 de0862b95b22159679034529bfde1078d4371190e94cfa71265a34480f93edb409525539dc5fe284e6201eb41cf9206966f0c6bf3904341b50fb3ebe30cf722e

memory/2020-13-0x0000000000400000-0x0000000000423000-memory.dmp

memory/2020-14-0x00000000750B0000-0x00000000751C0000-memory.dmp

memory/2020-12-0x00000000750B0000-0x00000000751C0000-memory.dmp