IOC Report
SecuriteInfo.com.TScope.Trojan.Delf.21240.32647.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.TScope.Trojan.Delf.21240.32647.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Users\user\Desktop\Config\coldef.ini
ISO-8859 text, with very long lines (578), with CRLF line terminators
dropped
C:\Users\user\Desktop\Config\coldef2.ini
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\Desktop\Config\coldef3.ini
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\Desktop\DelZip190.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\Desktop\ServerVersionInfo.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\Update\ErrorLog.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\Update\coldef.ini
ISO-8859 text, with very long lines (578), with CRLF line terminators
dropped
C:\Users\user\Desktop\Update\coldef.ini.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\Desktop\Update\coldef2.ini
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\Desktop\Update\coldef2.ini.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\Desktop\Update\coldef3.ini
ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\Desktop\Update\coldef3.ini.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\Desktop\Update\krenmain.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
C:\Users\user\Desktop\Update\krenmain.exe.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\Desktop\Update\openfaxCLIB.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Desktop\Update\openfaxCLIB.dll.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\Desktop\Version.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\krenmain.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
C:\Users\user\Desktop\openfaxCLIB.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.21240.32647.exe
"C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.21240.32647.exe"
malicious

URLs

Name
IP
Malicious
http://file.kren.co.kr/NewDown/Ziped/Config/coldef.ini.zip
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/Ziped/Config/coldef3.ini.zip
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/Ziped/KTPSock.dll.zip
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/UnZiped/Config/coldef.ini
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/Ziped/openfaxCLIB.dll.zip
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/UnZiped/Config/coldef3.ini
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/UnZiped/krenmain.exe
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/UnZiped/Config/coldef2.ini
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/UnZiped/KTPSock.dll
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/Ziped/krenmain.exe.zip
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/Ziped/Config/coldef2.ini.zip
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/DelZip190.dll
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/VersionInfo.Ini
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/UnZiped/openfaxCLIB.dll
210.181.31.83
malicious
http://file.kren.co.kr/NewDown/UnZiped/
unknown
http://dev.fone.olleh.com
unknown
http://ocsp.thawte.com0
unknown
http://file.kren.co.kr/NewDown/DelZip190.dllU
unknown
http://file.kren.co.kr/NewDown/Ziped/Config/
unknown
http://www.indyproject.org/
unknown
http://crl.thawte.com/ThawteCodeSigningCA.crl0
unknown
http://file.kren.co.kr/NewDown/UnZiped/openfaxCLIB.dllni_?_???_???_????.
unknown
http://file.kren.co.kr/NewDown/UnZiped/Config/coldef3.ini)
unknown
http://file.kren.co.kr/NewDown/UnZiped/Config/
unknown
http://crl.thawte.com/ThawtePremiumServerCA.crl0
unknown
http://file.kren.co.kr/NewDown/Ziped/
unknown
http://file.kren.co.kr/NewDown/Ziped/KTPSock.dll.zipl
unknown
http://file.kren.co.kr/NewDown/Ziped/openfaxCLIB.dll.zipp
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
file.kren.co.kr
210.181.31.83
malicious

IPs

IP
Domain
Country
Malicious
210.181.31.83
file.kren.co.kr
Korea Republic of
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4630000
trusted library allocation
page read and write
28B1000
heap
page read and write
5EB000
unkown
page write copy
620000
heap
page read and write
678000
heap
page read and write
7B4000
heap
page read and write
2350000
direct allocation
page read and write
22A3000
direct allocation
page read and write
5C5000
unkown
page execute and read and write
474A000
direct allocation
page read and write
236D000
direct allocation
page read and write
7B4000
heap
page read and write
68C000
heap
page read and write
66B000
heap
page read and write
46E0000
direct allocation
page read and write
232C000
direct allocation
page read and write
AB8000
heap
page read and write
4630000
trusted library allocation
page read and write
28B1000
heap
page read and write
960000
direct allocation
page read and write
46F0000
direct allocation
page read and write
7B4000
heap
page read and write
19B000
stack
page read and write
7B4000
heap
page read and write
474A000
direct allocation
page read and write
2398000
direct allocation
page read and write
65B000
heap
page read and write
7B4000
heap
page read and write
2316000
direct allocation
page read and write
7FDE0000
direct allocation
page read and write
53F000
unkown
page execute and write copy
7B4000
heap
page read and write
994000
direct allocation
page read and write
2C3E000
stack
page read and write
7B4000
heap
page read and write
98D000
direct allocation
page read and write
7E5E0000
direct allocation
page read and write
4751000
direct allocation
page read and write
2334000
direct allocation
page read and write
4630000
trusted library allocation
page read and write
473A000
direct allocation
page read and write
237C000
direct allocation
page read and write
2E7F000
stack
page read and write
2301000
direct allocation
page read and write
2291000
direct allocation
page read and write
9B1000
direct allocation
page read and write
898000
heap
page read and write
7B4000
heap
page read and write
4710000
direct allocation
page read and write
4130000
trusted library allocation
page read and write
2308000
direct allocation
page read and write
940000
direct allocation
page read and write
47C1000
direct allocation
page read and write
231D000
direct allocation
page read and write
4130000
trusted library allocation
page read and write
2520000
trusted library section
page read and write
9AA000
direct allocation
page read and write
68F000
heap
page read and write
4733000
direct allocation
page read and write
4751000
direct allocation
page read and write
938000
direct allocation
page read and write
5D4000
unkown
page execute and read and write
7B4000
heap
page read and write
62E000
heap
page read and write
47A4000
direct allocation
page read and write
4630000
trusted library allocation
page read and write
472D000
direct allocation
page read and write
7B4000
heap
page read and write
479D000
direct allocation
page read and write
2342000
direct allocation
page read and write
46F0000
direct allocation
page read and write
4700000
direct allocation
page read and write
2B11000
heap
page read and write
4630000
trusted library allocation
page read and write
AB0000
heap
page read and write
7B4000
heap
page read and write
2260000
direct allocation
page read and write
5EE000
unkown
page read and write
2366000
direct allocation
page read and write
47D0000
direct allocation
page read and write
2358000
direct allocation
page read and write
9C8000
direct allocation
page read and write
22C2000
direct allocation
page read and write
22E8000
direct allocation
page read and write
75E000
stack
page read and write
7B4000
heap
page read and write
2374000
direct allocation
page read and write
4770000
direct allocation
page read and write
230F000
direct allocation
page read and write
7B4000
heap
page read and write
400000
unkown
page readonly
46CC000
direct allocation
page read and write
46D1000
direct allocation
page read and write
2553000
heap
page read and write
24B0000
direct allocation
page execute and read and write
472D000
direct allocation
page read and write
2349000
direct allocation
page read and write
4130000
trusted library allocation
page read and write
46D3000
direct allocation
page read and write
7B4000
heap
page read and write
28B3000
heap
page read and write
5F0000
heap
page read and write
890000
trusted library allocation
page read and write
7B4000
heap
page read and write
46D1000
direct allocation
page read and write
7B4000
heap
page read and write
4700000
direct allocation
page read and write
2B00000
heap
page read and write
931000
direct allocation
page read and write
7B4000
heap
page read and write
7B4000
heap
page read and write
2D3F000
stack
page read and write
4760000
direct allocation
page read and write
4758000
direct allocation
page read and write
22F4000
direct allocation
page read and write
472D000
direct allocation
page read and write
7B4000
heap
page read and write
400000
unkown
page readonly
4130000
trusted library allocation
page read and write
46D8000
direct allocation
page read and write
4130000
trusted library allocation
page read and write
7B4000
heap
page read and write
7B4000
heap
page read and write
4630000
trusted library allocation
page read and write
2501000
trusted library allocation
page read and write
4751000
direct allocation
page read and write
235F000
direct allocation
page read and write
62A000
heap
page read and write
7B4000
heap
page read and write
47C8000
direct allocation
page read and write
4630000
trusted library allocation
page read and write
9B8000
direct allocation
page read and write
7B4000
heap
page read and write
4734000
direct allocation
page read and write
46C4000
direct allocation
page read and write
22C9000
direct allocation
page read and write
22EC000
direct allocation
page read and write
29F0000
trusted library allocation
page read and write
2391000
direct allocation
page read and write
64B000
heap
page read and write
46E0000
direct allocation
page read and write
4760000
direct allocation
page read and write
97000
stack
page read and write
7B4000
heap
page read and write
29F0000
trusted library allocation
page read and write
7B4000
heap
page read and write
7B4000
heap
page read and write
233B000
direct allocation
page read and write
46D8000
direct allocation
page read and write
950000
direct allocation
page read and write
2D7E000
stack
page read and write
7B4000
heap
page read and write
5A1000
unkown
page execute and read and write
474A000
direct allocation
page read and write
24A0000
heap
page read and write
28C0000
heap
page read and write
4630000
trusted library allocation
page read and write
9C0000
direct allocation
page read and write
4630000
trusted library allocation
page read and write
7B4000
heap
page read and write
29C0000
heap
page read and write
401000
unkown
page execute and read and write
7B4000
heap
page read and write
4734000
direct allocation
page read and write
4748000
direct allocation
page read and write
7B4000
heap
page read and write
7B4000
heap
page read and write
7B4000
heap
page read and write
7B4000
heap
page read and write
4700000
direct allocation
page read and write
7B4000
heap
page read and write
7B4000
heap
page read and write
661000
heap
page read and write
22BB000
direct allocation
page read and write
672000
heap
page read and write
7F070000
direct allocation
page read and write
4743000
direct allocation
page read and write
5C8000
unkown
page execute and read and write
7B4000
heap
page read and write
890000
trusted library allocation
page read and write
2550000
heap
page read and write
422F000
stack
page read and write
46F0000
direct allocation
page read and write
47BA000
direct allocation
page read and write
4630000
trusted library allocation
page read and write
2383000
direct allocation
page read and write
28B0000
heap
page read and write
2325000
direct allocation
page read and write
7E670000
direct allocation
page read and write
238A000
direct allocation
page read and write
7B4000
heap
page read and write
7B0000
heap
page read and write
600000
heap
page read and write
2A70000
trusted library allocation
page read and write
7B4000
heap
page read and write
653000
heap
page read and write
28B5000
heap
page read and write
7B4000
heap
page read and write
4741000
direct allocation
page read and write
657000
heap
page read and write
4750000
direct allocation
page read and write
4710000
direct allocation
page read and write
7B4000
heap
page read and write
59B000
unkown
page execute and read and write
7B4000
heap
page read and write
4630000
trusted library allocation
page read and write
7B4000
heap
page read and write
46E0000
direct allocation
page read and write
4630000
trusted library allocation
page read and write
There are 199 hidden memdumps, click here to show them.