Collection of Upatre Samples ( alpha version)

Config File for 6a8eb62683f91a4358df62582259ea1c

md5
6a8eb62683f91a4358df62582259ea1c
source
malwr
link
https://malwr.com/analysis/Nzc0NTQwY2NhYjc1NGExZjk2ODkyNTVlODAzMjBlZjY/
malware_name
jitoposse.exe
temp_file
~Jit695A.txt
scandate
2015-06-02 02:53:02
parsed
2015-06-29 20:43:54
decrypt_keys
10be997b
check_keys
ee28c013
c2_server
93.185.4.90
baseport
9587
useragent
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.81 Safari/537.36
payload_format
reg
old
0
clientip
icanhazip.com
nr_targets
16
nr_delivery_sites
15
nr_delivery_sites_online
10
nr_payloads
1
ksa
rol
pdir
KATA21
delivered payloads:
1
b36a892a02fdf60a9ee8999310f9f735
downloaded
2015-06-29 20:43:54
scanned (on VT)
2015-06-04 22:27:28
positives
29 / 57
detected as
MicroWorld-eScan
Gen:Variant.Dyzap.16
CAT-QuickHeal
Backdoor.NetWiredRC.B4
Malwarebytes
Spyware.Dyre
F-Prot
W32/Dropper.gen8!Maximus
ESET-NOD32
a variant of Win32/Exploit.CVE-2013-3660.O
TrendMicro-HouseCall
Suspicious_GEN.F47V0603
Avast
Win64:Malware-gen
GData
Gen:Variant.Dyzap.16
BitDefender
Gen:Variant.Dyzap.16
Tencent
Trojan.Win32.Qudamah.Gen.7
Ad-Aware
Gen:Variant.Dyzap.16
Sophos
Troj/Agent-ANJZ
Comodo
TrojWare.Win32.PWS.Dyzap.MY
F-Secure
Gen:Variant.Dyzap.16
DrWeb
DLOADER.Trojan
VIPRE
BehavesLike.Win32.Malware.bsf (vs)
TrendMicro
TSPY_DYRE.SMF2
Emsisoft
Gen:Variant.Dyzap.16 (B)
Cyren
W64/Trojan.OBCO-5297
Avira
W32/Etap
Arcabit
Trojan.Dyzap.16
Microsoft
PWS:Win32/Dyzap
ByteHero
Virus.Win32.Part.c
ALYac
Gen:Variant.Dyzap.16
AVware
BehavesLike.Win32.Malware.bsf (vs)
VBA32
suspected of Trojan.Downloader.gen.h
Ikarus
Trojan.Win32.Battdil
AVG
Ransomer.IWU.dropper
Panda
Trj/Genetic.gen
not detected by:
Bkav, TotalDefense, nProtect, CMC, McAfee, Zillya, SUPERAntiSpyware, TheHacker, Alibaba, K7GW, K7AntiVirus, Agnitum, Symantec, ClamAV, Kaspersky, NANO-Antivirus, ViRobot, McAfee-GW-Edition, Jiangmin, Antiy-AVL, Kingsoft, AegisLab, AhnLab-V3, Baidu-International, Zoner, Rising, Fortinet, Qihoo-360
delivery sites:
1
https://178.214.221.89/kata21.png
b36a892a02fdf60a9ee8999310f9f735
2
https://37.57.144.177/kata21.png
b36a892a02fdf60a9ee8999310f9f735
3
https://173.248.22.227/kata21.png
b36a892a02fdf60a9ee8999310f9f735
4
https://173.248.31.1/kata21.png
b36a892a02fdf60a9ee8999310f9f735
5
https://173.248.31.6/kata21.png
b36a892a02fdf60a9ee8999310f9f735
6
https://173.248.16.79/kata21.png
7
https://24.240.107.12/kata21.png
8
https://188.255.236.2/kata21.png
9
https://188.255.167.4/kata21.png
10
https://188.255.175.213/kata21.png
11
https://173.248.27.163/kata21.png
b36a892a02fdf60a9ee8999310f9f735
12
https://173.243.255.79/kata21.png
b36a892a02fdf60a9ee8999310f9f735
13
https://69.9.204.114/kata21.png
b36a892a02fdf60a9ee8999310f9f735
14
https://73.175.203.173/kata21.png
b36a892a02fdf60a9ee8999310f9f735
15
https://188.255.239.34/kata21.png
b36a892a02fdf60a9ee8999310f9f735