top title background image
flash

view_attach_i1j.js

Status: finished
Submission Time: 2020-05-06 22:39:49 +02:00
Malicious
Evader
E-Banking Trojan
Trojan
Ursnif

Comments

Tags

Details

  • Analysis ID:
    228101
  • API (Web) ID:
    352648
  • Analysis Started:
    2020-05-06 22:40:24 +02:00
  • Analysis Finished:
    2020-05-06 22:50:33 +02:00
  • MD5:
    a25cf9a41ef7bebbe1d5439457945c14
  • SHA1:
    5c017df526fc350a985d474d48da8ebc4994c214
  • SHA256:
    8dd9b728e100ef5b03c4b7f9828a88486830f1a85043abdcc6b3fb10b722201a
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 48
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 92
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Without Instrumentation

IPs

IP Country Detection
47.241.106.208
United States

Domains

Name IP Detection
fs.ramtool.at
47.241.106.208

URLs

Name Detection
http://fs.ramtool.at/favicon.ico

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\njtgDDroR.txt
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#