flash

description#_63033.vbs

Status: finished
Submission Time: 23.06.2020 20:05:24
Malicious
E-Banking Trojan
Trojan
Evader
Ursnif

Comments

Tags

Details

  • Analysis ID:
    240938
  • API (Web) ID:
    377614
  • Analysis Started:
    23.06.2020 20:07:33
  • Analysis Finished:
    23.06.2020 20:18:43
  • MD5:
    3c96bf8a25b8555eadd3127ba2fe6e02
  • SHA1:
    0bb99baf23f4e0ad75cf60da01085f5e6a086d46
  • SHA256:
    eea5debef2bdb29e6c596517aa26b6d39edcac02e161d2730d81dbc66bef4ab5
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
100/100

malicious
17/60

malicious
15/31

malicious

IPs

IP Country Detection
47.241.8.147
United States
88.99.66.31
Germany

Domains

Name IP Detection
cdn.arsis.at
47.241.8.147
iplogger.org
88.99.66.31

URLs

Name Detection
http://cdn.arsis.at/api1/OOTq55LgPF0lV/NWLm9usy/r9pBPGN0cyr_2FnKSW11TGD/p_2Bqq5xzp/bqt65HWOw5uwz3XYy/daVmrfViFuKV/aL_2FunD9AH/sTYB_2BP5uqUMf/XMYtIbjUiqeDNmyKEniWO/4w6SGU_2B2sS6kvy/T8k88aiA8HFWwyQ/fKHJ_2FP1GKD_2BvmX/tcB6rMWle/QiGS1_2Fx_2FqHi7KlH6/hFnwvqkFyCxNF43D97u/BvprqgTBoDscOWEgSh_2BI/sj7Jbny2sgnxc/8wV8c5Tp/fnu_0A_0D9ikOxUPwsOuGM7/_2FnSJOOqX/TReLTOVqlt9iemKMX/0l1e_2B3Rklf/n2lCnAAWbpkKOeP/8YIa
http://cdn.arsis.at/EL
http://cdn.arsis.at/api1/cp14uOrShOCqrIBvaJwoU7/C1FlExG7vaQoO/oJRqPiaa/5WhdZJLO4jSCA4RcPHoQChu/5GbtwiDumo/CG8Pe9vhOq3ffG_2B/EI1RQr2sA7kJ/TY_2FG_2FOJ/M7eR0stTroiUgG/EHlfgNAc1FZcB0jl13lib/70jQVFO_2FxbMItS/VuyvCLu7S0oGHKq/83w4CudEKbc9z_2FZ5/nI6sLfNtc/I6kCYLmX6FK_2Fu9ElCv/m7BDddNu2xMzZoIYECV/2FK4pTSvhlMnL7UF_0A_0D/sAC3l2Bl4CeAL/6QqGO4YS/8JlJVKgQNUmPGo0Qk83PTki/dgeVrDhA6f/glYwm_2Fd/hfxXCEn
Click to see the 21 hidden entries
http://cdn.arsis.at/94
http://cdn.arsis.at/api1/BGWoEYk29tf8z2q4/qZfME9SHMNsMIpo/oUVtIl6wj30znXE8rD/U2gcm5wkB/dr7Yo05FxjRu2
http://cdn.arsis.at/api1/pCiPzFstbCpkQ8/TIrAoOyIGtuKu5xCRH1h3/QA3JkiiY_2F06Cp1/BjmCEzGHzcS19cM/RtaHwNb0qQxo31HD8B/WyBjpGZvU/6qm2gFlQJzfLAq9YcGPE/iRPW9xGkJoDsXoZiGFd/rHTh_2BiKgAkAULz4l85x5/QmZiyhGj_2FqU/qnrZh_2B/Z61VmMhexWvGi_2Blho2ekM/Y5_2FtJhhA/nZNrxn1hy4RLoqwr1/CAAcH4SOwVWq/m_2ByN5G8tw/m9aLf1n0UIiKLc/SY0f_0A_0DPJ9DbIe0gBS/_2Fmx_2B2o9ygsaH/W9G_2FnHS4PZpKF/ppekxAfzDt7_2BMMsJ/eMNlr77lNzjegi_2F/x
http://cdn.arsis.at/api1/pU3aiHxRLfRNi0Z8e/yIC3OOTyW_2F/cI2WGvRE0LH/ANN_2FLHh52Cf7/inEFf06IedP8CO5UnACKb/5YDEhlC6l1Kof81q/OX9O_2FZp1IZodx/i_2BYnByoNoZ_2B3p2/OuPAcR1bY/RuIEAxMDCO8AIwK_2B6P/UE_2Fwko_2BAWLfGCWL/jSUQofLZ_2BSojwc5JqOcY/_2FSTtjByfZop/5mLVpw5Z/HKE9wwmCiUkcp5Zj0Cz_2Bb/nn9wwdmosx/6h3xU2aYoPydAlgPc/Vix3Mm2WT_0A/_0DnWsGULFN/pqJd0_2FFMdQr1/eMHo6LK1u4bp3ZaUfzKti/l4nX9h9fvslQT_2B/A9gAe2do9P/vVh
http://cdn.arsis.at/api1/BGWoEYk29tf8z2q4/qZfME9SHMNsMIpo/oUVtIl6wj30znXE8rD/U2gcm5wkB/dr7Yo05FxjRu2AyzvKHP/wNep0VHmd8s6GmfWJYR/EmPV_2FGDMJ_2BT1LoC68y/FEXkzEamk_2B2/ZfPHdzVG/zLuaszOmxb8v2lW6EHY2vim/Jdbbnr6s7L/30uod05uuwDsFyCEL/NBaFHAMs3phn/UuABi7i4VTd/YpYqqq68Dj9xo7/5_2Fk3ohiQasHWrBLtnuw/gOB1FOdA_2B881_0/A_0D6acn5JmzFTf/T4rprrvPyIPDIr_2Fm/SY8fTTRhR/L7r7d8if3yJ62n7xjgPK/EjuZYJ2Fz5_2F/l
http://cdn.arsis.at/api1/LLex4_2FwVx5cugO/n3OGkDZ90rNlnmK/NK2hclnVmGlSN0HRtM/Dq4EirByR/0dKXlLez17EFg7rVeGjD/q6FC07kjcPHgU0bfnsM/e4lbJaMZHng10ZZKx79UVY/XGa7AzX8rWqH0/QUkuJKgG/IBPqzhs5gzL9yu7oa108yFs/BHTM32XLyG/FGdFosTHK_2FB5T_2/FLugq_2FdOeX/4cadEWZpJTt/Tlk910_2BQ9jOr/s4sGYa0Qwz4yxJ20fDG3_/2BdGREKE5ZTWKKdK/_0A_0Dp1DF_2BU9/_2Fhye5Q_2FcV86d0z/uZonvJVBg/Aq_2BYp_2BSL76e_2Bgh/eDgNE3mdPpty090Go1s/zSAXt
http://www.nytimes.com/
https://iplogger.org/1bD467
http://cps.letsencrypt.org0
http://cert.int-x3.letsencrypt.org/0
http://www.youtube.com/
http://ocsp.int-x3.letsencrypt.org0/
http://www.wikipedia.com/
https://iplogger.org/
http://www.amazon.com/
http://www.live.com/
http://www.reddit.com/
http://www.twitter.com/
https://iplogger.org/1bP467tem
http://cps.root-x1.letsencrypt.org0
https://iplogger.org/1bP467

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\GMT.svg
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\automatic.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
Click to see the 13 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\adobe.url
MS Windows 95 Internet shortcut text (URL=<https://adobe.com/>), ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\magnet.diff
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\pass.gpx
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\syringe.3g2
ASCII text, with very long lines, with no line terminators
#