flash

description#_24536.vbs

Status: finished
Submission Time: 29.06.2020 21:01:26
Malicious
E-Banking Trojan
Trojan
Evader
Ursnif

Comments

Tags

Details

  • Analysis ID:
    242110
  • API (Web) ID:
    379935
  • Analysis Started:
    29.06.2020 21:01:27
  • Analysis Finished:
    29.06.2020 21:07:15
  • MD5:
    0eae2e553630b7893aca883afce4c359
  • SHA1:
    d361bed5baf23bee3642ebe446bc1b3c34940e06
  • SHA256:
    08f605fcab58e08fefdb8f890af1e4d7f48fd0e8d71f0c1f817139461573f99d
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
100/100

malicious
17/59

malicious
8/30

IPs

IP Country Detection
8.209.73.71
Singapore
88.99.66.31
Germany

Domains

Name IP Detection
cdn.arsis.at
8.209.73.71
2no.co
88.99.66.31

URLs

Name Detection
http://cdn.arsis.at/api1/I1_2FESP/gb0JOreCPE_2B6ZLaY6_2BV/_2BZwyq_2B/_2FxhrWkrsFp08O_2/F3mSjqkF87cq/o_2BHKiFxSD/M6tmcuUt_2FFW3/LpBgQXZsc9I9S93D2bN6M/ODM6GzX6cpzOWjut/fpbyyhf_2BOOELg/ZPrHE2JlH3SXCReYq9/RXLLhFzzY/Qr2cghy7aQJ6LzBJMTuB/MBDdv2EWI1fQbUaFxbx/S1aoLLeg7QVRUcWSxSxws6/bp2GpiCQiIJJy/AVMXYKfJ/o9Afnd99OXkjKLWL_0A_0DA/dEk_2BHXc7/naVg_2FPUII0cDBGP/Xxo2yVODHC_2/F4Cfc73lb/sApb
https://2no.co/1vXQd7
https://2no.co/
Click to see the 12 hidden entries
https://2no.co/1vXQd7XeA
http://www.nytimes.com/
http://cps.letsencrypt.org0
http://cert.int-x3.letsencrypt.org/0
http://www.youtube.com/
http://ocsp.int-x3.letsencrypt.org0/
http://www.wikipedia.com/
http://www.amazon.com/
http://www.live.com/
http://www.reddit.com/
http://www.twitter.com/
http://cps.root-x1.letsencrypt.org0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\Ammerman.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Temp\swatch.c
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
Click to see the 13 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\Nakayama.mpe
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\adobe.url
MS Windows 95 Internet shortcut text (URL=<https://adobe.com/>), ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\choral.tex
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\sully.xml
ASCII text, with very long lines, with no line terminators
#