Note: this report may be incomplete because the AI analysis reached the following limit(s): token. # Malware Triage Report — Analysis #181 **Sample:** `6b866c187a0dee2fb751a8990d50dc1ed83f68e025720081e4d8e27097067dc8` --- ## Summary This is a **64-bit Windows PE executable** (8.9 MB) compiled with **MinGW** (`x86_64-w64-mingw32-cc`). The binary is a **Tor relay client**, specifically **Tor version 0.4.8.12** (commit `2beaa7557c3c93ec`), built as a static Windows executable capable of running as an NT service. It is linked against the Tor Project's source code (GPL-3.0 licensed), with extensive Tor relay functionality including onion service support, bridge relay mode, exit policy handling, and Tor network consensus fetching. --- ## Key Detections/IOCs | Indicator | Type | Notes | |-----------|------|-------| | `TorUsage` Yara match (2 hits) | Yara rule | Identifies Tor library/client usage | | `CreateServiceA` import reference | API | Used to register as a Windows service for persistence | | `EnumerateProcesses` Yara match (2 hits) | Yara rule | Process enumeration capability | | `tor 0.4.8.12` | String | Tor client version identifier | | `2beaa7557c3c93ec` | String | Tor commit hash | | `18.244.0.188` | IP address | Likely Tor directory authority/guard node | | `127.0.0.1` (×6) | IP address | Localhost — normal for SOCKS proxy binding | | `.onion` references (×11) | String | Onion service routing support | | `--defaults-torrc`, `SocksPort`, `ORPort`, `ControlPort`, `DNSPort`, `ExitRelay`, `HiddenServiceDir` | Configuration keywords | Full Tor relay/client configuration set | | Registry access: `HKLM`, `HKCU`, `HKU` | API | DNS nameserver loading from registry (legitimate Tor feature) | | Heavy crypto library presence (AES, ChaCha, RSA, EC curves, SHA256, MD5, etc.) | Constants | Standard for Tor's TLS/crypto implementation | | 127 dynamic strings, 1011 XOR-in-loop anomalies, 81 spaghetti functions, 46 stack array initializations | Anomalies | Consistent with a large, optimized, statically-linked crypto application | --- ## Evidence ### 1. Legitimate Tor Project Binary The binary contains full Tor Project copyright headers and standard legal notices: > *"Copyright (c) 2001-2004, Roger Dingledine / Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson / Copyright (c) 2007-2021, The Tor Project, Inc."* > *"This build of Tor is covered by the GNU General Public License (https://www.gnu.org/licenses/gpl-3.0.en.html)"* All URLs reference legitimate `torproject.org` domains: - `https://support.torproject.org/faq/staying-anonymous/` - `https://blog.torproject.org/lifecycle-of-a-new-relay` - `https://bridges.torproject.org/status?id=%s` - `https://trac.torproject.org/core/tor/8742` ### 2. Full Tor Relay Functionality The binary supports the complete Tor relay feature set: - **Relay mode**: "You are running a new relay. Thanks for helping the Tor network!" - **Bridge relay**: "BridgeRelay is 1", bridge configuration support - **Exit relay**: `ExitRelay`, `ExitPolicy`, `ReducedExitPolicy` - **Onion services v3**: "Onion services v3 onion to version 3", `HiddenServiceDir`, hidden service descriptor uploading - **Control port**: `ControlPort`, HTTP request handling on control port - **DNS/SOCKS proxy**: `DNSPort`, `SocksPort` - **Tor consensus fetching**: `/tor/status-vote/current/consensus/` ### 3. Service Installation Capability The `CreateServiceA` reference and the string *"Unsupported command (--list-fingerprint, --hash-password, --keygen, --dump-config, --verify-config, or --key-expiration) in NT service"* confirm the binary can install itself as a Windows service. This is a **documented, legitimate Tor feature** (`tor --service install`), not a persistence mechanism used by malware. ### 4. No Malicious Indicators - **No ransomware/exploit/credential-stealing keywords** found (no "ransomware", "bitcoin", "victim", etc.) - **No suspicious URLs or C2 infrastructure** — all URLs point to `torproject.org` - **Kesakode verdict**: Empty (no detection) - **No virtual/carved sub-files** embedded - The heavy crypto presence (AES, ChaCha, RSA, EC curves, SHA2, MD5, RIPEMD, Whirlpool, etc.) is consistent with Tor's cryptographic requirements for TLS, circuit building, and onion routing — not malware encryption ### 5. Anomalies Explained The high number of anomalies (XOR-in-loop: 1011, spaghetti functions: 81, stack array init: 46, dynamic strings: 127) are all consistent with a large, statically-linked, optimized C application. The cross-section jump (1 hit) and high-entropy buffers (6 hits) reflect data tables for cryptographic algorithms and compressed/encoded Tor network data. --- ## Verdict **CLEAN — Confidence: 92/100** This binary is a **legitimate, statically-compiled Tor 0.4.8.12 relay client** for Windows x64. All detected "suspicious" indicators (Tor usage, process enumeration, service creation, registry access, crypto primitives, network socket operations) are fully explained by Tor's documented functionality. There is no evidence of malicious behavior, embedded payloads, C2 communication, or exploitation code. **Note:** While the binary itself is not malicious, Tor software can be used for legitimate privacy purposes or misused for malicious network activity. The binary's presence on a system warrants context-aware investigation rather than immediate alarm.