Malware Analysis Help

hmattyarty25

New Member
Thread author
Apr 16, 2024
3
I had suspicion the trading software I use (CryptoRocket Metatrader 4) was malicious. The following reports from VirusTotal and Hybrid Analysis showed the sandbox/behavior analysis reports flagged them as malicious:

First Sandbox Report (threat score at the top right is 100/100):
Hybrid Analysis

Second Sandbox Report (mentions of keylogger and persistence):
VirusTotal pt.1 -- VirusTotal pt.2 -- VirusTotal pt.3 -- VirusTotal pt.4
(*included screenshots of these in the attached incase links don't work)

From a malware signature scanning lens, the software was only flagged by 2 out the 62 total scanning vendors so I decided not to link that. Again, I know MetaTrader 4 is a trusted trading software but my version of MetaTrader 4 is from CryptoRocket. I've read online CryptoRocket is a very shady company so I wouldn't put it pass them if they ended up having malware in their applications.

Please let me know what you guys think of the behavior analysis reports. Thanks!
 

Attachments

  • virustotal1.png
    virustotal1.png
    212.4 KB · Views: 41
  • virustotal2.png
    virustotal2.png
    180.6 KB · Views: 43
  • virustotal3.png
    virustotal3.png
    166.8 KB · Views: 38
  • virustotal4.png
    virustotal4.png
    170.7 KB · Views: 43

Bot

AI-powered Bot
Verified
Apr 21, 2016
3,476
The sandbox reports you provided indeed show some alarming flags, especially keylogger and persistence mentions. Even though CryptoRocket's reputation may be questionable, it's important to note that false positives can occur. However, a threat score of 100/100 is concerning. I would recommend not using this software until further analysis is done. Try contacting CryptoRocket about these findings and consider using a more reputable trading software in the meantime.
 

Wrecker4923

New Member
Apr 11, 2024
3
I don't know what's going on but:
1) Terminal.exe in your hybrid analysis report is a signed executable, but VT hasn't seen this submitted to it.
2) The zip file that you submitted to VT links to a different terminal.exe, with a different SHA256, which is apparently not signed. Another executable in the zip file, MetaEditor.exe, is also unsigned. Both executables have been flagged by 2-3 vendors. I believe Meta Trader executables are signed.

How did the submitted terminal.exe to two sites be different files? Fishy.
 
  • Like
Reactions: Jack

hmattyarty25

New Member
Thread author
Apr 16, 2024
3
I don't know what's going on but:
1) Terminal.exe in your hybrid analysis report is a signed executable, but VT hasn't seen this submitted to it.
2) The zip file that you submitted to VT links to a different terminal.exe, with a different SHA256, which is apparently not signed. Another executable in the zip file, MetaEditor.exe, is also unsigned. Both executables have been flagged by 2-3 vendors. I believe Meta Trader executables are signed.

How did the submitted terminal.exe to two sites be different files? Fishy.
My apologies, I should of clarified that the zip file (CryptoRocketMetatrader4.zip) from the VirusTotal report is the overarching program file that includes the terminal.exe file. Here is the Virus Total Report for just the terminal.exe file. As you can see now, the SHA-256's on both Virus Total and Hybrid Analysis match now.

I also wanted to include a cuckoo sandbox report Cuckoo Report for the terminal file and also for the overarching zip folder Cuckoo Report for the Zip file.

Let me know if you have any more questions as I appreciate your input. Thanks!
 
Last edited by a moderator:
Mar 10, 2024
360
I would start looking for another application to use for financial business as all 3 are demonstrating malicious behavior and indicators.

Sandbox checks are prevalent "which aware malware will perform", signs of obfuscation are present this goes in hand with sandbox aware and environment awareness as well as tries to evade analysis by sleeping many times. Creating or modifying of Certificates and the Suricata detection of SSLBL: Malicious JA3 SSL-Client Fingerprint.


The sandbox and analysis evasion is typical signs of a RAT. An information stealing malware.
 
Last edited:

hmattyarty25

New Member
Thread author
Apr 16, 2024
3
I would start looking for another application to use for financial business as all 3 are demonstrating malicious behavior and indicators.

Sandbox checks are prevalent "which aware malware will perform", signs of obfuscation are present this goes in hand with sandbox aware and environment awareness as well as tries to evade analysis by sleeping many times. Creating or modifying of Certificates and the Suricata detection of SSLBL: Malicious JA3 SSL-Client Fingerprint.


The sandbox and analysis evasion is typical signs of a RAT. An information stealing malware.

Sounds good. I appreciate the input! Would you recommend I do a clean reformat of my computer as there could be a chance this RAT could have spread to other applications on my system?
 
Last edited:
  • Like
Reactions: Practical Response

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top