Evasive Gootkit Banking Trojan | VTI
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Backdoor, Dropper, Spyware, Downloader

6ded37a61962a6a6626bd47adb66f5f73742d8d2125cdff1dc3f932d0a8e5d2e (SHA256)

gootkit_vbs-6ded37a6.vir.vbs

VBScript

Created at 2018-12-13 14:00:00

Notifications (2/2)

The overall sleep time of all monitored processes was truncated from "29 minutes, 45 seconds" to "1 minute, 40 seconds" to reveal dormant functionality.

Severity Category Operation Classification
5/5
Anti Analysis Tries to detect application sandbox -
  • Possibly trying to detect "Threadexpert" by checking for existence of module "dbghelp.dll".
  • Possibly trying to detect "Sandboxie" by checking for existence of module "sbiedll.dll".
5/5
Anti Analysis Tries to detect virtual machine -
  • Reads out system information, commonly used to detect VMs via registry. (Value "SystemBiosVersion" in key "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System").
  • Reads out system information, commonly used to detect VMs via registry. (Value "VideoBiosVersion" in key "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System").
5/5
Information Stealing Reads system data Spyware
5/5
Injection Writes into the memory of another running process -
  • "c:\users\nd9e1fyi\appdata\local\temp\smsvchost32.exe" modifies memory of "c:\program files (x86)\msecache\safari.exe"
5/5
Network Sets up server that accepts incoming connections Backdoor
4/5
Network Associated with known malicious/suspicious URLs -
  • URL "http://amd.martatovaglieri.it/upll?26201" is known as malicious URL.
  • URL "HTTP://drk.fm604.com/rpersist4/2091998236" is known as malicious URL.
3/5
Anti Analysis Delays execution -
2/5
Hide Tracks Writes an unually large amount of data to the registry -
  • Hides 512000 byte in "HKEY_CURRENT_USER\Software\AppDataLow\gpscsdch_0".
  • Hides 512000 byte in "HKEY_CURRENT_USER\Software\AppDataLow\gpscsdch_1".
  • Hides 512000 byte in "HKEY_CURRENT_USER\Software\AppDataLow\gpscsdch_2".
  • Hides 512000 byte in "HKEY_CURRENT_USER\Software\AppDataLow\gpscsdch_3".
  • Hides 512000 byte in "HKEY_CURRENT_USER\Software\AppDataLow\gpscsdch_4".
  • Hides 512000 byte in "HKEY_CURRENT_USER\Software\AppDataLow\gpscsdch_5".
  • Hides 512000 byte in "HKEY_CURRENT_USER\Software\AppDataLow\gpscsdch_6".
  • Hides 350258 byte in "HKEY_CURRENT_USER\Software\AppDataLow\gpscsdch_7".
  • Hides 4075 byte in "HKEY_CURRENT_USER\SOFTWARE\Microsoft\{7ade5bfc-66f6-4220-aa24-6032bdb90317}".
  • Hides 31817 byte in "HKEY_CURRENT_USER\SOFTWARE\Microsoft\{102f49a9-80c9-42ee-8924-3256738fc621}".
2/5
Network Performs DNS request -
2/5
Network Downloads data Downloader
2/5
Network Connects to HTTP server -
2/5
PE Drops PE file Dropper
2/5
PE Executes dropped PE file -
1/5
Process Creates system object -
  • Creates mutex with name "Global\PowerShell_CommandAnalysis_Lock_S-1-5-21-2172869166-1497266965-2109836178-1000".
1/5
Process Overwrites code -
1/5
Network Connects to remote host -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image