top title background image
flash

file.exe

Status: finished
Submission Time: 2023-02-07 19:54:36 +01:00
Malicious
Trojan
Spyware
Evader
Amadey, RedLine

Comments

Tags

  • exe

Details

  • Analysis ID:
    800799
  • API (Web) ID:
    1168017
  • Analysis Started:
    2023-02-07 19:59:16 +01:00
  • Analysis Finished:
    2023-02-07 20:15:12 +01:00
  • MD5:
    16755b75334b8655bc2357553a9fdab4
  • SHA1:
    5705cf96e5337cd165fce107d5d11c020a69fe4f
  • SHA256:
    e2b454a6a774a94abfde2acec235fde33da717943ab9e2c5c51b8428df0f9253
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 34/70
malicious
Score: 18/22
malicious

IPs

IP Country Detection
62.204.41.4
United Kingdom

URLs

Name Detection
http://62.204.41.4/Gol478Ns/Plugins/cred64.dll
http://62.204.41.4/Gol478Ns/Plugins/clip64.dll
62.204.41.4/Gol478Ns/index.php
Click to see the 1 hidden entries
http://62.204.41.4/Gol478Ns/index.php

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\4b9a106e76\mnolyk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\IXP000.TMP\bfCg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 8 hidden entries
C:\Users\user\AppData\Local\Temp\IXP000.TMP\xriv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\IXP001.TMP\afCf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\IXP001.TMP\nika.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\c1ec479e5342a2\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\nika.exe.log
CSV text
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\afCf.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\c1ec479e5342a2\cred64.dll
HTML document, ASCII text, with CRLF line terminators
#
\Device\ConDrv
ASCII text, with no line terminators
#