We are hiring! Windows Kernel Developer (Remote), apply here!
flash

cDouNOFXle.exe

Status: finished
Submission Time: 2022-08-06 00:51:05 +02:00
Malicious
Trojan
Evader
DCRat

Comments

Tags

  • DCRat
  • exe

Details

  • Analysis ID:
    679544
  • API (Web) ID:
    1047050
  • Analysis Started:
    2022-08-06 00:51:06 +02:00
  • Analysis Finished:
    2022-08-06 01:00:50 +02:00
  • MD5:
    54172888b473f2515b13fe1e2032a112
  • SHA1:
    fc4ff4d53a1ea6cfee9265840bfc1dda0ee8c1e6
  • SHA256:
    05379ea4600304f51cffa8d1ee9e3b2931a69129f6bed14d45a500d966a71fca
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
39/71

malicious
14/35

malicious
28/40

malicious

IPs

IP Country Detection
141.8.195.65
Russian Federation

Domains

Name IP Detection
a0702220.xsph.ru
141.8.195.65

URLs

Name Detection
http://a0702220.xsph.ru/tolowprocessorGeneratortrack.php?rRmbiWWxEOd55k=WTgIsnKuV&e7d5ea1a013b440ebf41c5b405309b9e=b64e0d0fcd8b0e37eaa44643c1b6ab3c&94c8169d9b8cbbe19972e7f6bf4e65c1=AM5MjZxQmMhRjMzE2M5kTN2EWOwczYxYGN3UDM5YjZwM2YmRmN2EDO&rRmbiWWxEOd55k=WTgIsnKuV
https://cp.sprinthost.ru
https://index.from.sh/pages/game.html
Click to see the 8 hidden entries
http://a0702220.xsph.ru/tolowprocessorGeneratortrack.php?rRmbiWWxEOd55k=WTgIsnKuV&e7d5ea1a013b440ebf
http://a0702220.xsph.ru8
http://a0702220.xsph.rux
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://a0702220.xsph.ru
http://go.mic
https://cp.sprinthost.ru/auth/login
http://a0702220.xsph.ru/

Dropped files

Name File Type Hashes Detection
C:\comproviderRuntimecommon\et1pu6VAlkUOY7GuC90A.vbe
data
#
C:\Recovery\ShellExperienceHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Recovery\conhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 19 hidden entries
C:\Recovery\explorer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\comproviderRuntimecommon\chainsavesref.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Recovery\winlogon.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\comproviderRuntimecommon\backgroundTaskHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\comproviderRuntimecommon\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Windows\Help\mui\0409\MrsUvRPGeImAhc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Windows\Web\Screen\MrsUvRPGeImAhc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Windows\Help\mui\0409\5f7cc7e87d7637
ASCII text, with no line terminators
#
C:\comproviderRuntimecommon\eddb19405b7ce1
ASCII text, with very long lines, with no line terminators
#
C:\comproviderRuntimecommon\DLLiR59GMmL352HHbgfc.bat
ASCII text, with no line terminators
#
C:\comproviderRuntimecommon\9e8d7a4ca61bd9
ASCII text, with very long lines, with no line terminators
#
C:\Windows\Web\Screen\5f7cc7e87d7637
ASCII text, with very long lines, with no line terminators
#
C:\Recovery\088424020bedd6
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\chainsavesref.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MrsUvRPGeImAhc.exe.log
ASCII text, with CRLF line terminators
#
C:\Recovery\f8c8f1285d826b
ASCII text, with very long lines, with no line terminators
#
C:\Recovery\cc11b995f2a76d
ASCII text, with very long lines, with no line terminators
#
C:\Recovery\7a0fd90576e088
ASCII text, with very long lines, with no line terminators
#