flash

http://www.tutka.net/~cafe/ahtdek.html

Status: finished
Submission Time: 25.06.2020 21:36:33
Malicious
Phishing
Phisher

Comments

Tags

Details

  • Analysis ID:
    241592
  • API (Web) ID:
    378908
  • Analysis Started:
    25.06.2020 21:36:33
  • Analysis Finished:
    25.06.2020 21:38:31
  • Technologies:
Full Report Engine Info Verdict Score Reports

Error: Incomplete analysis, please check the report for detailed error information
System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
56/100

malicious
9/79

IPs

IP Country Detection
169.239.129.66
Seychelles
62.145.169.141
Finland

Domains

Name IP Detection
d1.dropboxccdn.com
169.239.129.66
www.tutka.net
62.145.169.141

URLs

Name Detection
https://d1.dropboxccdn.com/d/yflr8295gsd6/
http://www.tutka.net/~cafe/ahtdek.htmlLhttp:/cafe/ahtdek.htmlRoot
http://www.tutka.net/favicon.ico
Click to see the 8 hidden entries
http://www.tutka.net/~cafe/ahtdek.htmlLhttp://www.tutka.net/~cafe/ahtdek.html
http://www.tutka.net/~
http://www.tutka.net/~cafe/ahtdek.htmlLhttp:/.com/d/yflr8295gsd6/Root
http://www.tutka.net/~cafe/ahtdek.htmlLhttp:/Root
http://www.tutka.net/~cafe/ahtdek.html
http://www.tutka.net/~cafe/ahtdek.htmlRoot
https://d1.dropboxccdn
http://www.tutka.net/~cafe/ahtdek.htmln

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\ahtdek[1].htm
HTML document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AC0B7013-B766-11EA-AADE-C25F135D3C65}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{AC0B7015-B766-11EA-AADE-C25F135D3C65}.dat
Microsoft Word Document
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B6164230-B766-11EA-AADE-C25F135D3C65}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\httpErrorPagesScripts[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\V5D02472\NewErrorPageTemplate[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VINVDFP6\dnserror[1]
HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VINVDFP6\down[1]
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VTIIBVU5\errorPageStrings[1]
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF13189545D7C2DF0D.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF51A33FCF21CABC32.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF545BCCED2D5428A0.TMP
data
#