top title background image
flash

ePAY-Advice_Rf[UC7749879100].exe

Status: finished
Submission Time: 2023-03-17 13:56:45 +01:00
Malicious
Trojan
Evader
Spyware
GuLoader, Lokibot

Comments

Tags

  • exe
  • guloader
  • lokibot
  • signed

Details

  • Analysis ID:
    828721
  • API (Web) ID:
    1195824
  • Analysis Started:
    2023-03-17 13:56:47 +01:00
  • Analysis Finished:
    2023-03-17 14:20:48 +01:00
  • MD5:
    06bf8620598b674fc3506a2844d42d65
  • SHA1:
    00e28bd96e338f7bfff9c41d985de05f010d8ea7
  • SHA256:
    98883d7d2678fd8cbdad8b8c1ca7cf13a797b1074f081dee24aba14dcc346ffe
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 68
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 100
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301

Third Party Analysis Engines

malicious
Score: 32/69
malicious
Score: 11/39
malicious

IPs

IP Country Detection
171.22.30.147
Germany
188.114.96.3
European Union

Domains

Name IP Detection
zed-unusual-activity-com.veldaeffertz.ml
188.114.96.3

URLs

Name Detection
https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sear&
https://zed-unusual-activity-com.veldaeffertz.ml/z
http://171.22.30.147/flowe/five/fre.php
Click to see the 13 hidden entries
https://zed-unusual-activity-com.veldaeffertz.ml/
https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sea
https://zed-unusual-activity-com.veldaeffertz.ml/0
https://zed-unusual-activity-com.veldaeffertz.ml/P
https://zed-unusual-activity-com.veldaeffertz.ml/CodkZc57.sea-T
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
http://nsis.sf.net/NSIS_Error
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
http://nsis.sf.net/NSIS_ErrorError
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
http://www.gopher.ftp://ftp.

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\changes-allow-symbolic.svg
SVG Scalable Vector Graphics image
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\omfartsvejene\Reberbanernes\Muhamedaneres\Sminknings\LogoCanary.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\pt-br.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
#
Click to see the 16 hidden entries
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\printer-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\pan-start-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\network-wired-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\font-select-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\emblem-photos-symbolic.svg
SVG Scalable Vector Graphics image
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\ebook-reader.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\dotnet.api
HTML document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\Kontos.ini
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\be.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Rekapitulerer\Inseminerede79\avatar-default-symbolic.svg
SVG Scalable Vector Graphics image
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Provokations.Fje
data
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Fatalismen.Int
data
#
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\AEGISIIIRadeonHelper.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3425316567-2969588382-3778222414-1001\1b1d0082738e9f9011266f86ab9723d2_11389406-0377-47ed-98c7-d564e683c6eb
data
#
C:\Users\user\AppData\Roaming\5D4ACB\B73EF6.lck
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\nsp7072.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#