flash

bXdiOPDmyZ.exe

Status: finished
Submission Time: 18.05.2020 05:55:26
Malicious
Trojan
Spyware
Evader
FormBook

Comments

Tags

Details

  • Analysis ID:
    230931
  • API (Web) ID:
    358180
  • Analysis Started:
    18.05.2020 05:55:27
  • Analysis Finished:
    18.05.2020 06:14:01
  • MD5:
    c50f6a19b90539cf83a0637f739982f9
  • SHA1:
    51b1635e0e1e2ff1d150958ef27fa80b5ffb5bb2
  • SHA256:
    c0f5f94b8f695e7c5a4b6884ff1a122a2122ae1ed4e2a28a8c5470bbe957fa5a
  • Technologies:
Full Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
100/100

malicious
54/72

malicious
12/37

malicious
26/30

malicious

IPs

IP Country Detection
198.54.117.197
United States
69.172.201.153
Canada
173.236.180.81
United States
Click to see the 1 hidden entries
198.185.159.144
United States

Domains

Name IP Detection
www.poyik.com
198.54.117.197
www.worldinnovativesolutions.com
173.236.180.81
www.abblaster.com
69.172.201.153
Click to see the 14 hidden entries
www.hongsemall.com
0.0.0.0
www.bbbav62621.com
0.0.0.0
www.zabierzowska.com
0.0.0.0
www.rosedarte.com
0.0.0.0
www.angelika-dorn.com
0.0.0.0
www.xylemco.com
0.0.0.0
www.xn--fiqw6ol9bis7g.com
0.0.0.0
www.ugrejr.win
0.0.0.0
www.diffcomplex.net
0.0.0.0
www.sewamobildanbus.com
0.0.0.0
www.etoufu.com
0.0.0.0
www.vogahnews.com
0.0.0.0
www.happyhage.com
0.0.0.0
ext-cust.squarespace.com
198.185.159.144

URLs

Name Detection
http://www.zabierzowska.com/sh/?8pFL=LUR8/txceBDtIKNXLiQMutYOIYoLpa/yZvZq3kQ0sBAXqAM4bNfHWEKMD4Yt5BclzbK7&ers=Ml54sjKpKXO8nzrP
http://www.poyik.com/sh/?ers=Ml54sjKpKXO8nzrP&8pFL=jmVQmi4sjS7ih7V2IoNMh1SkeFqY0dJymV2JACzQPE/qHepWmAmodPcElCzP+DKsrkIQ
http://www.abblaster.com/sh/?ers=Ml54sjKpKXO8nzrP&8pFL=5GGoshPm8DtXJbtv0j0CpM0ZScDouSGJSOqUOJNMNiXSV7FSaO+82pviX4ynrFwNCgG8
Click to see the 28 hidden entries
http://www.worldinnovativesolutions.com/sh/
http://www.zabierzowska.com/sh/
http://www.poyik.com/sh/
http://www.worldinnovativesolutions.com/sh/?8pFL=oCU8qkR86wHM4cE0Nkw8zeB5R9pLzrdrR6drjm45vOC9QNVBuIjVP0TQIAKENpCxedHo&ers=Ml54sjKpKXO8nzrP
http://www.apache.org/licenses/LICENSE-2.0
http://www.founder.com.cn/cn/bThe
http://www.msn.com/ocid=iehpk
http://www.msn.com/de-ch/?ocid=iehp%
http://www.tiro.com
http://www.worldinnovativesolutions.com
http://www.goodfont.co.kr
http://www.carterandcone.coml
http://www.sajatypeworks.com
http://www.typography.netD
http://www.founder.com.cn/cn/cThe
http://fontfabrik.com
http://www.founder.com.cn/cn
http://www.msn.com/de-ch/?ocid=iehpG
http://www.msn.com/?ocid=iehp
http://www.jiyu-kobo.co.jp/
https://wis-consultancy.com/sh/?8pFL=oCU8qkR86wHM4cE0Nkw8zeB5R9pLzrdrR6drjm45vOC9QNVBuIjVP0TQIAKENpC
http://www.%s.comPA
http://www.fonts.com
http://www.sandoll.co.kr
http://www.zhongyicts.com.cn
http://www.sakkal.com
http://www.msn.com/de-ch/ocid=iehp
http://ns.microsoftom/photo/1.2/tD

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\DB1
SQLite 3.x database, last written using SQLite version 3024000
#
C:\Users\user\AppData\Local\Temp\Dzhld\ntbhcfw6lm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\O-979P0E\O-9logrf.ini
data
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Roaming\O-979P0E\O-9logri.ini
data
#
C:\Users\user\AppData\Roaming\O-979P0E\O-9logrv.ini
data
#
C:\Users\user\AppData\Local\VirtualStore\Windows\win.ini
ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
MS Windows shortcut, Item id list present, Points to a file or directory, Read-Only, Directory, ctime=Wed Apr 11 22:38:20 2018, mtime=Mon May 18 02:58:04 2020, atime=Mon May 18 02:58:03 2020, length=8192, window=hide
#
C:\Users\user\AppData\Roaming\O-979P0E\O-9logim.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
#
C:\Users\user\AppData\Roaming\O-979P0E\O-9logrg.ini
data
#
C:\Windows\win.ini
ASCII text, with no line terminators
#