top title background image
flash

kyFBQxVbsg.exe

Status: finished
Submission Time: 2022-06-26 09:43:23 +02:00
Malicious
Trojan
Spyware
Evader
Remcos

Comments

Tags

  • exe
  • RAT
  • RemcosRAT

Details

  • Analysis ID:
    652393
  • API (Web) ID:
    1019897
  • Analysis Started:
    2022-06-26 09:43:27 +02:00
  • Analysis Finished:
    2022-06-26 09:57:34 +02:00
  • MD5:
    972334f0c55d0aeab0b32efe41ea3470
  • SHA1:
    e9097b5cd1f976ecaf0accedf14f1d22bd72e6fa
  • SHA256:
    eb91bf1e2eb3877f0942cef113bb0fb76e2c2fd2c2651dbf09f6da6df649e8fb
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 31/67
malicious
Score: 15/26
malicious

IPs

IP Country Detection
194.5.98.107
Netherlands

Domains

Name IP Detection
nikahuve.ac.ug
194.5.98.107
tuekisaa.ac.ug
0.0.0.0
parthaha.ac.ug
0.0.0.0
Click to see the 1 hidden entries
kalskala.ac.ug
0.0.0.0

URLs

Name Detection
nikahuve.ac.ug
http://geoplugin.net/json.gp
https://github.com/mgravell/protobuf-net
Click to see the 7 hidden entries
https://github.com/mgravell/protobuf-neti
https://stackoverflow.com/q/14436606/23354
https://github.com/mgravell/protobuf-netJ
http://geoplugin.net/json.gp/C
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://stackoverflow.com/q/11564914/23354;
https://stackoverflow.com/q/2152978/23354

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kyFBQxVbsg.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Qerdo.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esjq1xkt.ffx.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pshfc5wv.vht.psm1
very short file (no magic)
#
C:\Users\user\AppData\Roaming\forbas\scxs.dat
data
#
C:\Users\user\Documents\20220626\PowerShell_transcript.128757.EFYe5VSb.20220626094450.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#