top title background image
flash

skynet_0.3.exe

Status: finished
Submission Time: 2020-07-19 21:40:48 +02:00
Malicious
E-Banking Trojan
Trojan
Evader
ZeusVM

Comments

Tags

  • skynet

Details

  • Analysis ID:
    247431
  • API (Web) ID:
    390455
  • Analysis Started:
    2020-07-20 05:58:01 +02:00
  • Analysis Finished:
    2020-07-20 06:06:58 +02:00
  • MD5:
    dfc6739d6c5fddfc0e3a7289b60462d6
  • SHA1:
    63a3c16db8254d4e5b0b450e34962612057f21ca
  • SHA256:
    0c80fa8807477cff8c9c3ed7b2a857538f022b1e8829020d09f60bd71f1afd9a
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 45/72
malicious
Score: 19/24
malicious

IPs

IP Country Detection
162.88.193.70
United States
86.59.21.38
Austria
212.112.245.170
Germany
Click to see the 1 hidden entries
128.31.0.39
United States

Domains

Name IP Detection
checkip.dyndns.com
162.88.193.70
checkip.dyndns.org
0.0.0.0

URLs

Name Detection
http://checkip.dyndns.org/
http://sourceware.org/pthreads-win32/DVarFileInfo$
http://curl.haxx.se/rfc/cookie_spec.html

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W2BICE6W\NQLT3XJS.htm
HTML document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\libcurl-4.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
#
C:\Users\user\AppData\Local\Temp\libpdcurses.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Local\Temp\poclbm120222.cl
C source, ASCII text
#
C:\Users\user\AppData\Local\Temp\pthreadGC2.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
#
C:\Users\user\AppData\Roaming\tor\hidden_service\hostname.tmp
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\tor\hidden_service\private_key.tmp
PEM RSA private key
#
C:\Users\user\AppData\Roaming\tor\state.tmp
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\tor\unverified-consensus.tmp
ASCII text, with very long lines, with CRLF line terminators
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#