flash

PO For-COVID-19 Products.jar

Status: finished
Submission Time: 31.08.2020 06:31:42
Malicious

Comments

Tags

Details

  • Analysis ID:
    279755
  • API (Web) ID:
    454764
  • Analysis Started:
    31.08.2020 06:31:43
  • Analysis Finished:
    31.08.2020 06:48:06
  • MD5:
    1d5620ec8f5dc6de6d0c98c53efc9e5b
  • SHA1:
    08fff82996a4590474ad95c43cf0ffb1df604f87
  • SHA256:
    8fa51db15722c9e5ae2ff0344cea3442c090a70f99ebf382e65e39ff1645e37d
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: w10x64 Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
48/100

System: w10x64 Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run Condition: Without Tracing

malicious
48/100

malicious
33/60

malicious
28/48

URLs

Name Detection
http://java.oracle.com/
http://bugreport.sun.com/bugreport/

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Oracle\Java\.oracle_jre_usage\cce3fe3b0d8d83e2.timestamp
ASCII text, with CRLF line terminators
#
C:\cmdlinestart.log
ASCII text, with CRLF line terminators
#