flash

SWIFT_TRANSFERCOPY9379737368379TRVLABORTEDHERMAICHYSTERO.exe

Status: finished
Submission Time: 28.05.2020 07:59:55
Malicious
Ransomware
Trojan
Evader
Nanocore GuLoader

Comments

Tags

Details

  • Analysis ID:
    233708
  • API (Web) ID:
    363568
  • Analysis Started:
    28.05.2020 07:59:56
  • Analysis Finished:
    28.05.2020 08:11:34
  • MD5:
    b1917430655c9911618b21a70d0a5c94
  • SHA1:
    fe6743ce83d11fab3daf8d5d2284083447f69b3b
  • SHA256:
    ccce552fcfd985afb778d4b06b697938d133b18ce005a7541976fa12c8a996f8
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
100/100

malicious
15/80

IPs

IP Country Detection
216.38.2.213
United States
23.105.131.240
United States
172.217.23.97
United States

Domains

Name IP Detection
earthtradeint.duckdns.org
23.105.131.240
earthtradeint.theworkpc.com
216.38.2.213
googlehosted.l.googleusercontent.com
172.217.23.97
Click to see the 2 hidden entries
doc-0s-50-docs.googleusercontent.com
0.0.0.0
doc-10-1s-docs.googleusercontent.com
0.0.0.0

URLs

Name Detection
https://doc-0s-50-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/p5rub1r0
https://doc-10-1s-docs.googleusercontent.com/biYh0Zi74qPl65cvTni6jCGdacaqXayF5RMwZ8fPj-Ca-ei_xN3HWGp
https://doc-10-1s-docs.googleusercontent.com/.
Click to see the 11 hidden entries
http://ocsp.pki.goog/gts1o10
https://doc-10-1s-docs.googleusercontent.com/
https://doc-0s-50-docs.googleusercontent.com/
http://pki.goog/gsr2/GTS1O1.crt0
https://doc-10-1s-docs.googleusercontent.com/docs/securesc/4qm4hu5jgk58a23dt2h2dqgte4hcmvrj/4u526l9o
https://doc-0s-50-docs.googleusercontent.com/7
http://crl.pki.goog/gsr2/gsr2.crl0?
http://ocsp.pki.goog/gsr202
https://pki.goog/repository/0
http://crl.pki.goog/GTS1O1.crl0
https://doc-10-1s-docs.googleusercontent.co

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\tmp1436.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\59407D34-C8C5-44DF-A766-BA8A11CB1CB0\run.dat
data
#
C:\Users\user\commercializesautochthoni\Complexifyhalakistafladsbr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 10 hidden entries
C:\Program Files (x86)\WPA Service\wpasv.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\wpasv.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp1689.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\59407D34-C8C5-44DF-A766-BA8A11CB1CB0\catalog.dat
data
#
C:\Users\user\AppData\Roaming\59407D34-C8C5-44DF-A766-BA8A11CB1CB0\settings.bak
data
#
C:\Users\user\AppData\Roaming\59407D34-C8C5-44DF-A766-BA8A11CB1CB0\settings.bin
data
#
C:\Users\user\AppData\Roaming\59407D34-C8C5-44DF-A766-BA8A11CB1CB0\storage.dat
data
#
C:\Users\user\AppData\Roaming\59407D34-C8C5-44DF-A766-BA8A11CB1CB0\task.dat
ASCII text, with no line terminators
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#