top title background image
flash

file.exe

Status: finished
Submission Time: 2023-02-07 19:43:37 +01:00
Malicious
Trojan
Spyware
Evader
Amadey, RedLine

Comments

Tags

  • exe

Details

  • Analysis ID:
    800795
  • API (Web) ID:
    1168009
  • Analysis Started:
    2023-02-07 19:55:34 +01:00
  • Analysis Finished:
    2023-02-07 20:10:43 +01:00
  • MD5:
    b16d53f153404f5825765f11ab2b6827
  • SHA1:
    cc5d6001624f836f5aa82e0178c6c2dc2fdac2c4
  • SHA256:
    128da440dc3448874960fb1eb8d34c283ba78f6517e20b57f2faa158d84a3fd0
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 37/70
malicious
Score: 18/22
malicious

IPs

IP Country Detection
62.204.41.4
United Kingdom

URLs

Name Detection
http://62.204.41.4/Gol478Ns/Plugins/cred64.dll
http://62.204.41.4/Gol478Ns/index.php
http://62.204.41.4/Gol478Ns/Plugins/clip64.dll
Click to see the 29 hidden entries
62.204.41.4/Gol478Ns/index.php
http://62.204.41.4/Gol478Ns/index.phpa106e76
http://62.204.41.4/Gol478Ns/index.phpC
http://62.204.41.4/Gol478Ns/Plugins/cred64.dlls
http://62.204.41.4/Gol478Ns/Plugins/cred64.dll(;
http://62.204.41.4/Gol478Ns/index.php9e5342a2
http://62.204.41.4/Gol478Ns/index.phpH
http://62.204.41.4/Gol478Ns/index.phprundll32.exel
http://62.204.41.4/Gol478Ns/Plugins/clip64.dll2;
http://62.204.41.4/Gol478Ns/index.phpZI
http://62.204.41.4/Gol478Ns/index.phpix
http://62.204.41.4/Gol478Ns/index.phpQ
http://62.204.41.4/Gol478Ns/index.phprundll32.exe#
http://62.204.41.4/Gol478Ns/index.phpR
http://62.204.41.4/Gol478Ns/index.php8
http://62.204.41.4/Gol478Ns/index.php(l
http://62.204.41.4/Gol478Ns/index.phpp
http://62.204.41.4/Gol478Ns/index.php4
http://62.204.41.4/Gol478Ns/index.phps
http://62.204.41.4/Gol478Ns/index.php5342a2
http://62.204.41.4/Gol478Ns/index.phpion
http://62.204.41.4/Gol478Ns/index.phpi
http://62.204.41.4/Gol478Ns/index.phpn
http://62.204.41.4/Gol478Ns/index.phpm32
http://62.204.41.4/Gol478Ns/index.phpa
http://62.204.41.4/Gol478Ns/Plugins/cred64.dlli;
http://62.204.41.4/Gol478Ns/index.phpd
http://62.204.41.4/Gol478Ns/index.phprundll32.exe=
http://62.204.41.4/Gol478Ns/index.phpoft

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\4b9a106e76\mnolyk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\IXP000.TMP\bKug.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 8 hidden entries
C:\Users\user\AppData\Local\Temp\IXP000.TMP\xriv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\IXP001.TMP\aKuf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\IXP001.TMP\nika.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\c1ec479e5342a2\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\nika.exe.log
CSV text
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\aKuf.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\c1ec479e5342a2\cred64.dll
HTML document, ASCII text, with CRLF line terminators
#
\Device\ConDrv
ASCII text, with no line terminators
#