Details
Malware Family PredatorPain
Date Added March 20, 2016, 3 a.m.
MD5 9d7ed9206c4b77e9016f2f08934a0dfc
Sha256 4d0bc193ef608f03fc69426ee6e489cd29d25033d5865691cab57ef6218ad2b2
Robot Robots lovingly delivered by robohash.org
Config Sections
Use Email yesemail
Email Address gozman@gozmanfrank.1eko.com
Bound Files False
SMTP Port 587
FTP Pass ftppassword
SMTP Server mx1.3owl.com
FTP Host ftp.host.com
Interval Timer 900000
PHP Link http://www.example.com/directory/logs.php
Version Predator Pain v14
Download & Exec Disabledownloader
FTP User username
Use FTP noftp
Use PHP nophp
Email Password d7au8G3uaf
Advertising
VirusTotal

42 out of 57 AV's Identified the sample as Malicious

Virus Total Report

Domain Data
Domain IP Country Code
Geo Location
Yara Rules
Comments
comments powered by Disqus