? Malware Analysis Report
? Malware Analysis Report
Analysis
Report
"In cybersecurity, every hash carries a hidden story — some uphold trust, others
uncover threats. This hash analysis reveals a dark narrative: vigilance isn't a luxury, it's
a fundamental necessity."
1. Executive summary
2. Hash information
3. IOC ( Indicator of Compromise)
• contacted ip addresses
• contacted domains
• contacted URL
• graph summary
4. Behaviour analysis
• Network Communication
• Process Action
• Key Behaviour of Hash
5. conclusion
1.Executive summary
The submitted file is an executable (.exe), analyzed using a malware detection platform (likely VirusTotal). The
results indicate a high probability of malicious intent, as 51 out of 72 security vendors have flagged the file as
malicious. The file's nature and behavior suggest it may pose a significant threat to the system if executed.
Detection Insights:
• The file has been classified under multiple malware categories, including:
• Hash Name:
988ffe0676b80b8bb6275199a281e0a4d0581919663b4dcdbc8cf18d8e11d5a6
• Hashes
o MD5: 075a794ae38872d36059a46b84a117d5
o SHA-1: 4290bb627384540dab505a85b15f1aa326efe3d9
o SHA-256:
988ffe0676b80b8bb6275199a281e0a4d0581919663b4dcdbc8cf18d8e11d5a6
o Vhash: 015056655d1c05109043z800437z47z62z4103
o Authentihash:
6eaf416d08fdc90e5f1ca028ec04169cc5069eb22b0b1e14df99576b9275b7c7
o Imphash: 7ed0d71376e55d58ab36dc7d3ffda898
o SSDEEP:
o 1536:D0YBsBE3ain2Q5xq10DZYzIaDyI9/x0wVQMwBMkqq/uzEfkV9:gnBTi2CR
DZYzIaFQMwaj2kv
103.224.182.243 3 / 94
204.11.56.48 3 / 94
3.223.115.185 1 / 94
52.217.171.101 0 / 94
91.195.240.41 0 / 94
➢ Contacted domains:
ocsp.comodoca.com 0 / 96 200
www.downloadfastfree.com 0 / 94 200
aff-software.s3-website-us-east-
6 / 94 403
1.amazonaws.com
d14fidyjqoxydf.cloudfront.net 3 / 93 403
d2w2iwyju0dnjt.cloudfront.net 1 / 89 200
downloadactivation.com 0 / 96 200
ww1.downloadfastfree.com 0 / 72 200
➢ Graph Summary:
The graph represents the relationship and behavior of a Portable Executable (PE) file
(malware) and its subsequent activities in the infected environment. Below is a detailed
breakdown of the graph, including the impact of each interaction.
o Central Node: The PE (Portable Executable) file acts as the primary carrier of malicious
code.
o This file is responsible for initiating all malicious activities, such as dropping files, contacting
remote servers, and embedding resources.
5 Contacted IPs:
The malware communicated with 5 remote IPs, likely Command and Control (C2) servers
for data exfiltration, remote control, or downloading further payloads.
4 Dropped Files:
It dropped 4 files (DLL, EXE, or Scripts) on the system, which may be used to maintain
persistence, deploy payloads, or bypass security controls.
1 PE Resource Children:
The malware contains one embedded resource (like an embedded DLL, script, or shellcode),
which could further execute malicious tasks when triggered.
➢ Network Communication
1. HTTP Requests
These are outbound requests made from an infected system to different URLs. The URLs
listed indicate potential malicious activity, primarily related to:
• Suspicious download sites like downloadfastfree.com, downloadactivation.com,
and fusioninstall.com
• Cloud-based delivery networks (cloudfront.net and amazonaws.com), which may be
used for hosting malware
• Executable file downloads (Cloud_Backup_Setup.exe, mw360_dist.exe, rt-
installer.exe), indicating possible installation of malicious software.
2. DNS Resolutions
The system attempted to resolve domain names to IP addresses, showing communication with:
3. IP Traffic
The infected system established TCP connections to various IP addresses, predominantly
over port 80 (HTTP). This behavior is consistent with:
• The presence of multiple .exe file downloads suggests that this activity may be
related to malware distribution.
• Domains like fusioninstall.com and downloadfastfree.com are known to be
associated with potentially unwanted applications (PUAs) or adware.
• AWS and CloudFront are often used to host malicious payloads.
➢ Process Actions:
➢ Threat Level: CRITICAL – High risk of data exfiltration, system control, and
further malware deployment.
1. 🗑 Delete the File: Immediately delete the file from your system and empty the
Recycle Bin.
2. 🛡 Full System Scan: Run a full antivirus scan using Windows Defender,
Malwarebytes, or Kaspersky to detect and remove threats.
3. Monitor Network Traffic: Check for suspicious network activity using Wireshark
or Netstat and block any unknown IPs/domains.
5. 🗂 Remove Malware Traces: Check Startup Items, Task Manager, and Registry for
unknown processes or files and delete them.
7. Reanalyze (Optional): If necessary, submit the file for fresh sandbox analysis to
uncover any hidden threats.
Final Verdict: