top title background image
flash

R8IaYkCPbJ.exe

Status: finished
Submission Time: 2020-07-31 13:11:54 +02:00
Malicious
Trojan
Spyware
Evader
Remcos

Comments

Tags

  • exe
  • ModiLoader
  • nVpn
  • RAT
  • RemcosRAT

Details

  • Analysis ID:
    255320
  • API (Web) ID:
    405954
  • Analysis Started:
    2020-07-31 21:49:14 +02:00
  • Analysis Finished:
    2020-07-31 22:03:53 +02:00
  • MD5:
    24c2540e588585a4daf8b3fe1112a78d
  • SHA1:
    d48b28ebb1a010eae20a10aa4d1d6c5a79ea6f96
  • SHA256:
    08fe7e61eafc062a5f50981fae0f578442cdfd31a00e2398389c8bea37485f02
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 92
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
79.134.225.49
Switzerland
216.58.214.193
United States

Domains

Name IP Detection
fgdjhksdfsdxcbv.ru
0.0.0.0
karimgoussd.ug
79.134.225.49
asf-ris-prod-neurope.northeurope.cloudapp.azure.com
168.63.67.155
Click to see the 4 hidden entries
googlehosted.l.googleusercontent.com
216.58.214.193
doc-14-0g-docs.googleusercontent.com
0.0.0.0
g.msn.com
0.0.0.0
doc-04-3c-docs.googleusercontent.com
0.0.0.0

URLs

Name Detection
http://crl.pki.g
https://doc-14-0g-docs.googleusercontent.com/9
https://drive.google
Click to see the 19 hidden entries
https://doc-14-0g-docs.googleusercontent.com/docs/securesc/kib6dnt4761atrbcue5pm7a0jn43v175/1aefij1r
https://doc-14-0g-docs.googleusercontent.com/s
https://pki.goog/repository/0
http://ocsp.pki.goog/gsr202
http://ocsp.&
http://crl.pki.goog/gsr2/gsr2.crl0?
https://doc-04-3c-docs.googleusercontent.com/1
https://doc-14-0g-docs.googleusercontent.com/
https://doc-14-0g-docs.googleusercontent.com/docs/securesc/ki
http://pki.goog/gsr2/GTS1O1.crt0
https://doc-14-0g-docs.googleusercontent.com/m
https://doc-04-3c-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/vvhcn6vg
http://ocsp.pki.goog::
https://doc-14-0g-docs.googleus
http://crl.pki.goog/GTS1O1core.crl0
https://doc-04-3c-docs.googleusercontent.com/
https://drive.gox
http://ocsp.pki.goog/gts1o1core0
http://ocsp.pki.goog:

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Prhcsec.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\Public\Natso.bat
ASCII text, with CRLF, LF line terminators
#
C:\Users\Public\cde.bat
ASCII text, with CRLF line terminators
#
Click to see the 6 hidden entries
C:\Users\Public\x.bat
ASCII text, with CRLF line terminators
#
C:\Users\Public\x.vbs
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\Prhc[1]
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\Prhc[2]
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\Prhc[1]
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Prhc.url
MS Windows 95 Internet shortcut text (URL=<file:\\\C:\\Users\\user\\AppData\\Local\\Prhcsec.exe>), ASCII text, with CRLF line terminators
#