We are hiring! Windows Kernel Developer (Remote), apply here!
flash

gI5xZdIxUs.exe

Status: finished
Submission Time: 2022-08-31 23:51:09 +02:00
Malicious
Ransomware
Trojan
Evader
Gandcrab, ReflectiveLoader

Comments

Tags

  • exe

Details

  • Analysis ID:
    694566
  • API (Web) ID:
    1062038
  • Analysis Started:
    2022-08-31 23:56:48 +02:00
  • Analysis Finished:
    2022-09-01 00:07:22 +02:00
  • MD5:
    98a12ec721c098842fbfd7384d5a72ae
  • SHA1:
    9dfd7d1746c8ae943f3dced0f85f0e3c6f5084f3
  • SHA256:
    f83457d173841c7e944bc60b00c197ca93c864893c71902cf1b1a36decdd30a4
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
60/70

malicious
26/35

malicious
38/41

malicious

Domains

Name IP Detection
nomoreransom.coin
0.0.0.0
nomoreransom.bit
0.0.0.0
gandcrab.bit
0.0.0.0
Click to see the 4 hidden entries
dns1.soprodns.ru
0.0.0.0
dns2.soprodns.ru
0.0.0.0
ipv4bot.whatismyipaddress.com
0.0.0.0
8.8.8.8.in-addr.arpa
0.0.0.0

URLs

Name Detection
http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
http://ipv4bot.whatismyipaddress.com/a
https://www.torproject.org/
Click to see the 3 hidden entries
http://ipv4bot.whatismyipaddress.com/4
http://ipv4bot.whatismyipaddress.com/
https://tox.chat/download.html

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\414045e2d09286d5db2581e0d955d358_d06ed635-68f6-4e9a-955c-4899f5f57b9a
data
#