Collection of Upatre Samples ( alpha version)

Config File for 6e3a1a77241fb7ec78c1e63e15290a43

md5
6e3a1a77241fb7ec78c1e63e15290a43
source
malwr
link
https://malwr.com/analysis/N2QzNmI5OTc5NzgxNDNiNzhhZDVjZTA4YjEyMjdhZjk/
malware_name
POBANEP.exe
temp_file
POBA389A.txt
scandate
2015-05-26 14:52:32
parsed
2015-06-24 12:44:19
decrypt_keys
422c763c
check_keys
5fca3fab
c2_server
93.185.4.90
baseport
13920
useragent
Mozilla/5.0 (Windows NT 6.1;WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36 OPR/28.0.1750.48
payload_format
reg
old
0
clientip
icanhazip.com
nr_targets
16
nr_delivery_sites
15
nr_delivery_sites_online
8
nr_payloads
1
ksa
rol
pdir
TULS22
delivered payloads:
1
008e4c8218caede4be249fea0f761b4c
downloaded
2015-06-24 12:44:19
scanned (on VT)
2015-06-13 18:40:19
positives
32 / 57
detected as
MicroWorld-eScan
Gen:Variant.Dyzap.16
CAT-QuickHeal
Backdoor.NetWiredRC.B4
Malwarebytes
Spyware.Dyre
F-Prot
W32/Dropper.gen8!Maximus
ESET-NOD32
Win32/Battdil.S
TrendMicro-HouseCall
Suspicious_GEN.F47V0611
Avast
Win64:Malware-gen
GData
Gen:Variant.Dyzap.16
Kaspersky
Trojan-Banker.Win32.Dyre.ms
BitDefender
Gen:Variant.Dyzap.16
ByteHero
Virus.Win32.Part.c
Tencent
Trojan.Win32.Qudamah.Gen.7
Ad-Aware
Gen:Variant.Dyzap.16
Sophos
Mal/Generic-L
Comodo
TrojWare.Win32.PWS.Dyzap.MY
F-Secure
Gen:Variant.Dyzap.16
DrWeb
DLOADER.Trojan
VIPRE
BehavesLike.Win32.Malware.bsf (vs)
TrendMicro
Cryp_Xin2
Emsisoft
Gen:Variant.Dyzap.16 (B)
Cyren
W64/Trojan.EOPK-2648
Avira
W32/Etap
Antiy-AVL
Trojan/Win32.SGeneric
Arcabit
Trojan.Dyzap.16
AhnLab-V3
Trojan/Win32.Battdil
Microsoft
PWS:Win32/Dyzap
ALYac
Gen:Variant.Dyzap.16
AVware
BehavesLike.Win32.Malware.bsf (vs)
VBA32
suspected of Trojan.Downloader.gen.h
Ikarus
Trojan.Win32.Battdil
AVG
Generic_r.FEN
Panda
Trj/Genetic.gen
not detected by:
Bkav, nProtect, CMC, McAfee, Zillya, SUPERAntiSpyware, K7AntiVirus, Alibaba, K7GW, TheHacker, NANO-Antivirus, Symantec, ClamAV, Agnitum, AegisLab, McAfee-GW-Edition, Jiangmin, Kingsoft, ViRobot, TotalDefense, Baidu-International, Zoner, Rising, Fortinet, Qihoo-360
delivery sites:
1
https://216.51.193.145/tulsa22.png
008e4c8218caede4be249fea0f761b4c
2
https://93.119.102.70/tulsa22.png
3
https://73.22.119.204/tulsa22.png
4
https://96.46.103.232/tulsa22.png
008e4c8218caede4be249fea0f761b4c
5
https://68.70.242.203/tulsa22.png
008e4c8218caede4be249fea0f761b4c
6
https://66.215.30.118/tulsa22.png
008e4c8218caede4be249fea0f761b4c
7
https://96.40.19.168/tulsa22.png
8
https://107.161.207.151/tulsa22.png
9
https://31.131.142.204/tulsa22.png
008e4c8218caede4be249fea0f761b4c
10
https://96.46.99.183/tulsa22.png
008e4c8218caede4be249fea0f761b4c
11
https://46.37.205.163/tulsa22.png
12
https://188.255.175.252/tulsa22.png
13
https://178.140.20.132/tulsa22.png
14
https://96.46.100.49/tulsa22.png
008e4c8218caede4be249fea0f761b4c
15
https://64.111.36.52/tulsa22.png
008e4c8218caede4be249fea0f761b4c