top title background image
flash

SCAN Swift 054545676700000000000000001.exe

Status: finished
Submission Time: 2022-05-26 07:53:25 +02:00
Malicious
Trojan
Evader
Spyware
GuLoader, AgentTesla

Comments

Tags

  • exe

Details

  • Analysis ID:
    634468
  • API (Web) ID:
    1001972
  • Analysis Started:
    2022-05-26 07:53:25 +02:00
  • Analysis Finished:
    2022-05-26 08:15:23 +02:00
  • MD5:
    c5cc0d82dd8e1cf55d7fd3b5c067752b
  • SHA1:
    cdbb4ff532aefa60d63feb5d0717f28c776ef9ed
  • SHA256:
    3e02a6175b6567980d495bc4323d36c137fdc86f80b01a1b0da1d85d105221be
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 72
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 100
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering

Third Party Analysis Engines

malicious
Score: 9/69
malicious
Score: 5/41

IPs

IP Country Detection
103.211.219.10
Seychelles

Domains

Name IP Detection
donaldtrumpverse.com
103.211.219.10

URLs

Name Detection
http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.bin
http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.binG
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
Click to see the 14 hidden entries
http://nsis.sf.net/NSIS_ErrorError
https://stage-us1.api.ws-hp.com/clienttelemetry
https://api.ipify.org%GETMozilla/5.0
https://support.google.com/chrome/?p=plugin_flash
https://api.ipify.org%H
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
http://MBStZn.com
https://pie-us1.api.ws-hp.com/clienttelemetry
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
http://DynDns.comDynDNS
https://us1.api.ws-hp.com/clienttelemetry
http://127.0.0.1:HTTP/1.1
http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.binH

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\Bllebrs.bar
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\Bluetooth Suite help_ITA.chm
MS Windows HtmlHelp Data
#
C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Temp\Pressekonferencens.maa
data
#
C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
#
C:\Users\user\AppData\Local\Temp\libLerc.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
#
C:\Users\user\AppData\Local\Temp\libenchant-2.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
#
C:\Users\user\AppData\Local\Temp\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nsk14B9.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\system-shutdown.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Local\Temp\zoom-out-symbolic.svg
SVG Scalable Vector Graphics image
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#