top title background image
flash

Priliv_163977.ppt

Status: finished
Submission Time: 2020-06-15 10:11:11 +02:00
Malicious
Trojan
Spyware
Exploiter
Evader
Lokibot

Comments

Tags

Details

  • Analysis ID:
    238429
  • API (Web) ID:
    372802
  • Analysis Started:
    2020-06-15 10:11:13 +02:00
  • Analysis Finished:
    2020-06-15 10:17:23 +02:00
  • MD5:
    5aff4e8843cdfa1f8e825c389fd7463f
  • SHA1:
    6f6f09d5886a648e1a86821aacad537053b95f69
  • SHA256:
    3f940b16d8019f0560ba7f1bfb8ce7161ea3ba98da364bb70fde9de7da9616e2
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: unknown

Third Party Analysis Engines

malicious
Score: 11/62
malicious
Score: 15/48
malicious

IPs

IP Country Detection
67.199.248.17
United States
37.48.76.56
Netherlands
104.23.98.190
United States

Domains

Name IP Detection
dixis.bounceme.net
37.48.76.56
j.mp
67.199.248.17
pastebin.com
104.23.98.190

URLs

Name Detection
http://dixis.bounceme.net/ht.php/rBo37eoxFiPU9
https://pastebin.com/raw/5yhVu53JSD
https://pastebin.com/raw/5yhVu53J...U
Click to see the 26 hidden entries
http://j.mp/asdakxasxsasjdsddodkasodkaosT
http://crl.entrust.net/2048ca.crl0
http://j.mp/
https://pastebin.com/raw/5yhVu53Jhttps://pastebin.com/raw/5yhVu53Jh2d
https://pastebin.com/raw/5yhVu53Jddodkasodkaosj
https://secure.comodo.com/CPS0
http://ocsp.entrust.net0D
https://pastebin.com/
https://pastebin.com/raw/5yhVu53JC:
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
https://pastebin.com/raw/5yhVu53Jcku)
https://pastebin.com/raw/5yhVu53J...
http://j.mp/asdakxasxsasjdsddodkasodkaos
Https://pastebin.com/raw/5yhVu53JR&G
https://pastebin.com/raw/5yhVu53Jddodkasodkaos
http://www.diginotar.nl/cps/pkioverheid0
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
https://pastebin.com/raw/5yhVu53Jl/
https://pastebin.com/raw/5yhVu53J
https://pastebin.com/raw/5yhVu53Jhttps://pastebin.com/raw/5yhVu53Jh2dh2d
http://www.ibsensoftware.com/
http://ocsp.entrust.net03
http://crl.entrust.net/server1.crl0
https://pastebin.com/raw/5yhVu53Jq
https://pastebin.com/raw/5yhVu53Jt
https://pastebin.com/raw/5yhVu53JWebKit/536.5

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\340PBZ6L\S0BpDKJ9[1].txt
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6WVX4LLA\S0BpDKJ9[1].txt
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QA2WCFUD\5yhVu53J[1].txt
HTML document, ASCII text, with very long lines, with CRLF line terminators
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTTXP0TC\asdakxasxsasjdsddodkasodkaos[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Roaming\85CB65\5E97AF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\85CB65\5E97AF.lck
very short file (no magic)
#
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-290172400-2828352916-2832973385-1004\ce1d9ab061b5b7ff17c765603e761dae_0f4f5130-48fa-4204-b1c4-585fbb81cd25
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Priliv_163977.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:43 2020, mtime=Tue Jan 28 13:45:43 2020, atime=Mon Jun 15 07:12:08 2020, length=76800, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\ID2PV6GB.txt
ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GUK80MGZRWR0PKX459CF.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RYLGGKPEO5XA3RFFOC8X.temp
data
#