flash

citadel_3.1.0.0.exe

Status: finished
Submission Time: 19.07.2020 21:47:51
Malicious
Phishing
E-Banking Trojan
Trojan
Spyware
Evader
ZeusVM

Comments

Tags

  • citadel

Details

  • Analysis ID:
    247548
  • API (Web) ID:
    390611
  • Analysis Started:
    20.07.2020 09:07:19
  • Analysis Finished:
    20.07.2020 09:22:31
  • MD5:
    3d3ef329a4d920735fbc6c56d2a15691
  • SHA1:
    74c7c9c8470ea55c04ee3c7fe168793ee32d4686
  • SHA256:
    1ec347934db2ded3a012479882732bfb3cdc85b0d4b2911e3402c1fa693a2235
  • Technologies:
Full Report Engine Info Verdict Score Reports

malicious

System: w10x64 Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
62/71

malicious
27/39

malicious
33/39

malicious

IPs

IP Country Detection
3.1.0.0
United States

Domains

Name IP Detection
nightclubdisab.su
0.0.0.0
relectsdispla.net
0.0.0.0

URLs

Name Detection
https://site-cdn.onenote.net/161251631559_Images/LiveTileImages/Small/Image2.png
https://mem.gfx.ms/scripts/me/MeControl/10.20056.4/en-US/meBoot.min.js
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
Click to see the 95 hidden entries
http://www.jiyu-kobo.co.jp/
http://nightclubdisab.su/fet/
https://activity.windows.com
https://www.google.ch/?gws_rd=ssl
https://%s.dnet.xboxlive.com
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=11
https://acdn.adnxs.com/dmp/async_usersync.html?gdpr=0&seller_id=280&pub_id=43801
https://maps.windows.com/windows-app-web-linkows
https://px.ads.linkedin.com/collect/?fmt=gif&pid=7850
http://www.msn.com
https://s.yimg.com/lo/api/res/1.2/mpnNnPAItj5pNCsM3mwM7A--~A/Zmk9ZmlsbDt3PTIwODtoPTI0MjthcHBpZD1nZW1
https://mem.gfx.ms/scripts/me/MeControl/10.20056.4/en-US/meCore.min.js
https://contextual.media.net/nrrV79893.js
http://%02x%02x%02x%02x%02x%02x%02x%02x.com/%02x%02x%02x%02x/%02x%02x%02x%02x.php
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_350%2Cw_624%2Cc_fill%2Cg_faces:aut
http://www.sajatypeworks.com
http://www.founder.com.cn/cn/cThe
https://contextual.media.net/mediamain.html?&gdpr=0&cid=8CU157172&cpcd=pC3JHgSCqY8UHihgrvGr0A%3D%3D&
https://maps.windows.com/windows-app-web-link
https://www.bizographics.com/collect/?fmt=gif&pid=7850s
http://crt.sectigo.com/SectigoRSAOrganizationValidationSecureServerCA.crt0#
http://www.msn.com/?ocid=iehp
http://www.zhongyicts.com.cn
https://87102a4e47b39a9075c891cdc256e1e9.clo.footprintdns.com/apc/trans.gif?8c23236cfa866020f02514c9
https://img.s-msn.com/tenant/amp/entityid/AAbzMB2.img
http://crl.pki.goog/GTS1O1.crl0
https://acdn.adnxs.com/ast/ast.js
https://www.bizographics.com/collect/?fmt=gif&pid=7850
http://ocsp.sectigo.com09
http://ocsp.pki.goog/gts1o10
https://www.google.ch/xjs/_/js/k=xjs.s.en_GB.exaHKifUbd4.O/ck=xjs.s.VN7hb22Vkco.L.I11.O/am=AAAAgCUAs
https://logincdn.msauth.net/16.000/js/MeControl_US1oxnIoNcCp1NX7xVSBjw2.js
http://pki.goog/gsr2/GTS1O1.crt0
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
https://img.s-msn.com/tenant/amp/entityid/AAbzMB2
http://ocsp.pki.goog/gsr202
https://pki.goog/repository/0
https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1
http://www.google.ch/
https://%s.xboxlive.com
https://site-cdn.onenote.net/161251631559_Images/LiveTileImages/Wide/Image2.png
http://www.carterandcone.coml
https://srtb.msn.com/auction?a=de-ch&b=687d3f87ff2e49babadba9e49aac8d3f&c=MSN&d=http%3A%2F%2Fwww.msn
https://substrate.office.com
https://login.windows.net/
https://px.ads.linkedin.com/collect/?fmt=gif&pid=7850&liSync=true
https://logincdn.msauth.net/16.000/js/MeControl_tfp5xc9B9RRsZ_q18BJrBA2.js
https://pr-bh.ybp.yahoo.com/sync/msn/2D22DE20AE066B032C5ED0B2AF0F6A94
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_175%2Cw_300%2Cc_fill%2Cg_faces:aut
https://www.msn.com/content/images/icons/Favicon_EdgeStart.ico
http://%02x%02x%02x%02x%02x%02x%02x%02x.com/%02x%02x%02x%02x/%02x%02x%02x%02x.phpfileipfilewww.l
https://www.google.ch/xjs/_/js/k=xjs.s.en_GB.exaHKifUbd4.O/ck=xjs.s.VN7hb22Vkco.L.I11.O/m=Fkg7bd
https://aefd.nelreports.net/api/report?cat=bingrms
http://crl.pki.goog/gsr2/gsr2.crl0?
https://www.google.ch/images/branding/googlelogo/2x/googlelogo_color_272x92dp.png
http://crl.sectigo.com/SectigoRSAOrganizationValidationSecureServerCA.crl0
https://policies.yahoo.com/w3c/p3p.xml
https://xsts.auth.xboxlive.com/
https://login.windows.net
http://www.founder.com.cn/cn/bThe
https://xsts.auth.xboxlive.com
https://www.google.ch/images/nav_logo299.png
http://www.tiro.com
https://www.msn.com/spartan/en-us/secure/silentpassport?secure=true&lc=1033
https://cdn.adnxs.com/v/s/184/trk.js
http://www.goodfont.co.kr
https://mem.gfx.ms/scripts/me/MeControl/10.20027.3/en-US/meCore.min.js
https://s.yimg.com/lo/api/res/1.2/HTh4MviMESQCU1YsoWf5Ew--~A/Zmk9ZmlsbDt3PTIwODtoPTI0MjthcHBpZD1nZW1
http://nightclubdisab.su/fet/x
https://www.google.ch/images/searchbox/desktop_searchbox_sprites302_hr.png
http://www.typography.netD
http://nightclubdisab.su/fet/file.php
http://fontfabrik.com
https://s.yimg.com/lo/api/res/1.2/FN4h_a.kTjdeFYsRtNEUxg--~A/Zmk9ZmlsbDt3PTIwODtoPTI0MjthcHBpZD1nZW1
https://mem.gfx.ms/scripts/me/MeControl/10.20027.3/en-US/meBoot.min.js
https://www.google.ch/favicon.ico
https://cvision.media.net/new/300x300/3/108/131/132/67242227-7e6f-4527-83ab-b36ef6ebcdaa.jpg?v=9
http://www.%s.comPA
http://www.fonts.com
http://www.sandoll.co.kr
http://127.0.0.1:%u/
http://www.sakkal.com
http://relectsdispla.net/fet/file.php
http://www.apache.org/licenses/LICENSE-2.0
https://sectigo.com/CPS0
http://127.0.0.1:%u//%s/%s%sX-Type:
http://relectsdispla.net/fet/file.phpT
https://cvision.media.net/new/300x300/2/59/25/211/dbde3f3c-eae8-448a-9ce8-5bce3ce848b1.jpg?v=9
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
https://site-cdn.onenote.net/161251631559_Images/LiveTileImages/MediumAndLarge/Image2.png
http://www.msn.com/de-ch/?ocid=iehp
http://www.founder.com.cn/cn
https://87102a4e47b39a9075c891cdc256e1e9.clo.footprintdns.com/apc/trans.gif?0b76dc40748f1c54790c8a1c
http://relectsdispla.net/fet/file.php(
https://aefd.nelreports.net/api/report?cat=bingaot

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\tmpc2a3e256.bat
DOS batch file, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Dore\ceza.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtx
data
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Roaming\Ypuqci\ygnuo.xyt
data
#