top title background image
flash

citadel_1.3.0.0b.exe

Status: finished
Submission Time: 2020-07-19 20:45:25 +02:00
Malicious
E-Banking Trojan
Trojan
Evader
ZeusVM

Comments

Tags

  • citadel

Details

  • Analysis ID:
    247206
  • API (Web) ID:
    390058
  • Analysis Started:
    2020-07-20 00:02:37 +02:00
  • Analysis Finished:
    2020-07-20 00:18:22 +02:00
  • MD5:
    6845fad4aec0e0df22f1a1237703a3d9
  • SHA1:
    3b77a341b0779430f8c05a99e21b4f669bf0f699
  • SHA256:
    dd4a1d6b9752677f41861a343945230cbfced64ed31d24977557d7307897545d
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 62/71
malicious
Score: 32/39
malicious
Score: 29/31
malicious

IPs

IP Country Detection
1.3.0.0
China
92.123.7.210
European Union
92.123.29.59
European Union

URLs

Name Detection
https://xsts.auth.xboxlive.com
http://fontfabrik.com
http://www.typography.netD
Click to see the 97 hidden entries
https://www.google.ch/images/searchbox/desktop_searchbox_sprites302_hr.png
https://outlook.office.com/
https://s.yimg.com/lo/api/res/1.2/HTh4MviMESQCU1YsoWf5Ew--~A/Zmk9ZmlsbDt3PTIwODtoPTI0MjthcHBpZD1nZW1
https://mem.gfx.ms/scripts/me/MeControl/10.20027.3/en-US/meCore.min.js
http://www.goodfont.co.kr
https://mths.be/fromcodepoint
https://cdn.adnxs.com/v/s/184/trk.js
https://www.msn.com/spartan/en-us/secure/silentpassport?secure=true&lc=1033
http://www.tiro.com
https://www.google.ch/images/nav_logo299.png
https://s.yimg.com/lo/api/res/1.2/FN4h_a.kTjdeFYsRtNEUxg--~A/Zmk9ZmlsbDt3PTIwODtoPTI0MjthcHBpZD1nZW1
http://www.founder.com.cn/cn/bThe
https://login.windows.net
https://xsts.auth.xboxlive.com/
https://policies.yahoo.com/w3c/p3p.xml
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1.woff
http://crl.sectigo.com/SectigoRSAOrganizationValidationSecureServerCA.crl0
https://www.google.ch/images/branding/googlelogo/2x/googlelogo_color_272x92dp.png
http://crl.pki.goog/gsr2/gsr2.crl0?
https://aefd.nelreports.net/api/report?cat=bingrms
https://www.google.ch/xjs/_/js/k=xjs.s.en_GB.exaHKifUbd4.O/ck=xjs.s.VN7hb22Vkco.L.I11.O/m=Fkg7bd
http://korobsoftlove.ru/2014/file.php
https://sectigo.com/CPS0
https://site-cdn.onenote.net/161251631559_Images/LiveTileImages/Small/Image2.png
https://aefd.nelreports.net/api/report?cat=bingaot
https://pf.directory.live.com/profile/profile.asmx
https://87102a4e47b39a9075c891cdc256e1e9.clo.footprintdns.com/apc/trans.gif?0b76dc40748f1c54790c8a1c
http://www.founder.com.cn/cn
http://www.msn.com/de-ch/?ocid=iehp
https://site-cdn.onenote.net/161251631559_Images/LiveTileImages/MediumAndLarge/Image2.png
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
https://cdn.onenote.net/livetile/?Language=en-US
https://cvision.media.net/new/300x300/2/59/25/211/dbde3f3c-eae8-448a-9ce8-5bce3ce848b1.jpg?v=9
http://127.0.0.1:%u//%s/%s%sX-Type:
https://substrate.office.com/search/api/v2/resources
https://www.msn.com/content/images/icons/Favicon_EdgeStart.ico
http://www.apache.org/licenses/LICENSE-2.0
http://krbsftnow.ru/2014/file.php
http://www.sakkal.com
http://127.0.0.1:%u/
http://www.sandoll.co.kr
http://www.fonts.com
http://www.%s.comPA
https://cvision.media.net/new/300x300/3/108/131/132/67242227-7e6f-4527-83ab-b36ef6ebcdaa.jpg?v=9
https://www.google.ch/favicon.ico
https://mem.gfx.ms/scripts/me/MeControl/10.20027.3/en-US/meBoot.min.js
https://outlook.office.com/User.ReadWrite
https://contextual.media.net/mediamain.html?&gdpr=0&cid=8CU157172&cpcd=pC3JHgSCqY8UHihgrvGr0A%3D%3D&
https://acdn.adnxs.com/ast/ast.js
http://crl.pki.goog/GTS1O1.crl0
https://img.s-msn.com/tenant/amp/entityid/AAbzMB2.img
https://87102a4e47b39a9075c891cdc256e1e9.clo.footprintdns.com/apc/trans.gif?8c23236cfa866020f02514c9
http://www.zhongyicts.com.cn
https://site-cdn.onenote.net/161311631557_Images/LiveTileImages/Wide/Image2.png
https://site-cdn.onenote.net/161311631557_Images/LiveTileImages/MediumAndLarge/Image2.png
https://substrate.office.com/profile/v0/users/
https://substrate.office.com/api/v2.0/Users(
http://www.msn.com/?ocid=iehp
http://crt.sectigo.com/SectigoRSAOrganizationValidationSecureServerCA.crt0#
https://maps.windows.com/windows-app-web-link
https://www.bizographics.com/collect/?fmt=gif&pid=7850
http://www.founder.com.cn/cn/cThe
http://www.sajatypeworks.com
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_350%2Cw_624%2Cc_fill%2Cg_faces:aut
http://%02x%02x%02x%02x%02x%02x%02x%02x.com/%02x%02x%02x%02x/%02x%02x%02x%02x.php
https://contextual.media.net/nrrV79893.js
https://mem.gfx.ms/scripts/me/MeControl/10.20056.4/en-US/meCore.min.js
https://s.yimg.com/lo/api/res/1.2/mpnNnPAItj5pNCsM3mwM7A--~A/Zmk9ZmlsbDt3PTIwODtoPTI0MjthcHBpZD1nZW1
http://www.msn.com
https://px.ads.linkedin.com/collect/?fmt=gif&pid=7850
https://site-cdn.onenote.net/161311631557_Images/LiveTileImages/Small/Image2.png
https://acdn.adnxs.com/dmp/async_usersync.html?gdpr=0&seller_id=280&pub_id=43801
http://schema.org/reminder
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_175%2Cw_300%2Cc_fill%2Cg_faces:aut
https://aefd.nelreports.net/api/F
https://pr-bh.ybp.yahoo.com/sync/msn/2D22DE20AE066B032C5ED0B2AF0F6A94
https://logincdn.msauth.net/16.000/js/MeControl_tfp5xc9B9RRsZ_q18BJrBA2.js
https://cdn.onenote.net/
https://px.ads.linkedin.com/collect/?fmt=gif&pid=7850&liSync=true
https://login.windows.net/
https://srtb.msn.com/auction?a=de-ch&b=687d3f87ff2e49babadba9e49aac8d3f&c=MSN&d=http%3A%2F%2Fwww.msn
http://www.carterandcone.coml
https://site-cdn.onenote.net/161251631559_Images/LiveTileImages/Wide/Image2.png
https://%s.xboxlive.com
http://www.google.ch/
http://%02x%02x%02x%02x%02x%02x%02x%02x.com/%02x%02x%02x%02x/%02x%02x%02x%02x.phpfileipfilewww.www.
https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1
https://pki.goog/repository/0
http://ocsp.pki.goog/gsr202
https://img.s-msn.com/tenant/amp/entityid/AAbzMB2
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
http://pki.goog/gsr2/GTS1O1.crt0
https://logincdn.msauth.net/16.000/js/MeControl_US1oxnIoNcCp1NX7xVSBjw2.js
https://www.google.ch/xjs/_/js/k=xjs.s.en_GB.exaHKifUbd4.O/ck=xjs.s.VN7hb22Vkco.L.I11.O/am=AAAAgCUAs
http://ocsp.pki.goog/gts1o10
http://ocsp.sectigo.com09
https://px.ads.linkedin.com/collect/?fmt=gif&pid=7850&liSync=truet

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Ilkedesoxyer\apbyuxotab.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tmp9.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tmpEDD7.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Local\Temp\tmpEE17.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\tmpFFD9.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#