top title background image
flash

5tLwjRFzAW.exe

Status: finished
Submission Time: 2022-08-11 06:51:09 +02:00
Malicious
Ransomware
Trojan
Spyware
Evader
CryptOne, Djvu, Raccoon Stealer v2, Smok

Comments

Tags

  • exe
  • Formbook

Details

  • Analysis ID:
    682150
  • API (Web) ID:
    1049656
  • Analysis Started:
    2022-08-11 06:51:09 +02:00
  • Analysis Finished:
    2022-08-11 07:03:58 +02:00
  • MD5:
    203eaeca3c89f5ca7dc82668c4883b5a
  • SHA1:
    0d872229972ec1e3ea8173343a715b4a2fcb5855
  • SHA256:
    c4624241f0890dada47236f267303691f82bbbd28eed1a379a498bd3009cb734
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 19/88
malicious
Score: 9/19
malicious
Score: 21/26
malicious
malicious

IPs

IP Country Detection
185.237.206.60
Ukraine
110.14.121.125
Korea Republic of
45.138.74.104
Russian Federation
Click to see the 9 hidden entries
175.120.254.9
Korea Republic of
211.59.14.90
Korea Republic of
62.204.41.178
United Kingdom
190.117.75.91
Peru
85.192.63.46
Russian Federation
211.119.84.111
Korea Republic of
176.44.127.165
Saudi Arabia
162.0.217.254
Canada
193.56.146.177
unknown

Domains

Name IP Detection
monsutiur4.com
185.237.206.60
linislominyt11.at
110.14.121.125
acacaca.org
175.120.254.9
Click to see the 7 hidden entries
moroitomo4.net
0.0.0.0
cucumbetuturel4.com
0.0.0.0
nusurionuy5ff.at
0.0.0.0
susuerulianita1.net
0.0.0.0
nunuslushau.com
0.0.0.0
rgyui.top
190.140.74.43
api.2ip.ua
162.0.217.254

URLs

Name Detection
http://limo00ruling.org/
http://linislominyt11.at/
http://susuerulianita1.net/
Click to see the 38 hidden entries
http://lilisjjoer44.com/
http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1
http://85.192.63.46/f/1.exe
http://45.138.74.104/
http://mini55tunul.com/
http://acacaca.org/lancer/get.php
http://62.204.41.178/newfile.exe
http://nikogminut88.at/
http://acacaca.org/lancer/get.php?pid=F4B58C92E14ED1DB6A495C4F0112806C
http://cucumbetuturel4.com/
http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
http://193.56.146.177/
http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02
http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1xD
https://ac.ecosia.org/autocomplete?q=
http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1$D
http://www.openssl.org/support/faq.html
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
https://mozilla.org0
https://api.2ip.ua/geo.json
http://www.sqlite.org/copyright.html.
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
https://api.2ip.ua/-J
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
https://api.2ip.ua/geo.jsonn
https://support.google.com/chrome/?p=plugin_flash
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
http://www.opera.com0
http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02&
http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02PowerShell
http://193.56.146.177/e2f032260ba0b2ece29cbd952d3f7f02.
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
https://api.2ip.ua/
http://45.138.74.104/8d5bc04a8dfb506a455ebe83e0e99bb1wD
https://duckduckgo.com/ac/?q=
http://193.56.146.177/M
http://www.mozilla.com/en-US/blocklist/
https://duckduckgo.com/chrome_newtab

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\irbiwat:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\irbiwat
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\b4d5ea9d-82ae-4ef5-85ba-00d479d46415\A658.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 19 hidden entries
C:\Users\user\AppData\Local\Temp\E69F.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\D0E3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\A658.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\33.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\28E9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\y79VUKJAS8XH
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\ftvuhuw
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\geo[1].json
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\LocalLow\8EK4CZ3qdU65
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\LocalLow\w00Fi2l6Hi6X
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\LocalLow\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\k0MUzhlF0pI7
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
#
C:\Users\user\AppData\LocalLow\jId0qk9WVSf3
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\LocalLow\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#