flash

view_attach_i1j.js

Status: finished
Submission Time: 06.05.2020 22:39:49
Malicious
Evader
E-Banking Trojan
Trojan
Ursnif

Comments

Tags

Details

  • Analysis ID:
    228101
  • API (Web) ID:
    352648
  • Analysis Started:
    06.05.2020 22:40:24
  • Analysis Finished:
    06.05.2020 22:50:33
  • MD5:
    a25cf9a41ef7bebbe1d5439457945c14
  • SHA1:
    5c017df526fc350a985d474d48da8ebc4994c214
  • SHA256:
    8dd9b728e100ef5b03c4b7f9828a88486830f1a85043abdcc6b3fb10b722201a
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
48/100

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run Condition: Without Instrumentation

malicious
92/100

IPs

IP Country Detection
47.241.106.208
United States

Domains

Name IP Detection
fs.ramtool.at
47.241.106.208

URLs

Name Detection
http://fs.ramtool.at/favicon.ico

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\njtgDDroR.txt
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#