top title background image
flash

mPNVrHIpyt.exe

Status: finished
Submission Time: 2022-08-31 23:54:10 +02:00
Malicious
Ransomware
Trojan
Evader
Gandcrab, ReflectiveLoader

Comments

Tags

  • exe
  • GandCrab

Details

  • Analysis ID:
    694572
  • API (Web) ID:
    1062043
  • Analysis Started:
    2022-09-01 00:06:24 +02:00
  • Analysis Finished:
    2022-09-01 00:21:20 +02:00
  • MD5:
    cc7ae6e4c86f605aab66fbd04eef7997
  • SHA1:
    8c7c23c91ccecf548c6f9df30b839b9b24d57095
  • SHA256:
    95427e787bb623ba2d2ec51cb289ae579aea27a674d900f9aa239f6a034b05cc
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 59/70
malicious
Score: 29/37
malicious
Score: 30/31
malicious
malicious

Domains

Name IP Detection
ipv4bot.whatismyipaddress.com
0.0.0.0

URLs

Name Detection
http://gdcbmuveqjsli57x.onion/cd05fa18e84d425b
http://ipv4bot.whatismyipaddress.com/nxD
http://ipv4bot.whatismyipaddress.com/r
Click to see the 19 hidden entries
https://tox.chat/download.html
http://ipv4bot.whatismyipaddress.com/
http://ipv4bot.whatismyipaddress.com/Y
http://ipv4bot.whatismyipaddress.com/Z
https://www.torproject.org/
http://ipv4bot.whatismyipaddress.com/%
http://ipv4bot.whatismyipaddress.com/E:
http://ipv4bot.whatismyipaddress.com/a
http://ipv4bot.whatismyipaddress.com/K
http://ipv4bot.whatismyipaddress.com/.
http://ipv4bot.whatismyipaddress.com/pxV
http://ipv4bot.whatismyipaddress.com/)
http://ipv4bot.whatismyipaddress.com/S
http://ipv4bot.whatismyipaddress.com/3
http://ipv4bot.whatismyipaddress.com/T
http://ipv4bot.whatismyipaddress.com/u
http://ipv4bot.whatismyipaddress.com/5
http://ipv4bot.whatismyipaddress.com/6
http://ipv4bot.whatismyipaddress.com/0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Microsoft\wzltxa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#