We are hiring! Windows Kernel Developer (Remote), apply here!
flash

wThN5MTIsw.exe

Status: finished
Submission Time: 2022-08-31 23:48:13 +02:00
Malicious
Ransomware
Trojan
Evader
Gandcrab, ReflectiveLoader

Comments

Tags

  • exe
  • GandCrab

Details

  • Analysis ID:
    694565
  • API (Web) ID:
    1062037
  • Analysis Started:
    2022-08-31 23:55:57 +02:00
  • Analysis Finished:
    2022-09-01 00:09:34 +02:00
  • MD5:
    1813521f3884de8427728b54b5c9a391
  • SHA1:
    874f4efd9b2ba64fa3bcb6ae87b116bd526b85c3
  • SHA256:
    4e705159b6c3a72b2b160486b9d582f05e34cd89a767428ef47ff6562b39619e
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
64/71

malicious
27/29

malicious

malicious

Domains

Name IP Detection
ipv4bot.whatismyipaddress.com
0.0.0.0

URLs

Name Detection
http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
http://ipv4bot.whatismyipaddress.com/2
http://ipv4bot.whatismyipaddress.com/5
Click to see the 12 hidden entries
http://ipv4bot.whatismyipaddress.com/S
http://ipv4bot.whatismyipaddress.com/)
http://ipv4bot.whatismyipaddress.com/I
http://ipv4bot.whatismyipaddress.com/QL
http://ipv4bot.whatismyipaddress.com/g
http://ipv4bot.whatismyipaddress.com/I;
http://ipv4bot.whatismyipaddress.com/&
https://www.torproject.org/
http://ipv4bot.whatismyipaddress.com/G%b
http://ipv4bot.whatismyipaddress.com/x
http://ipv4bot.whatismyipaddress.com/
https://tox.chat/download.html

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#