top title background image
flash

sSQ1r2KRD8.exe

Status: finished
Submission Time: 2020-09-16 20:05:52 +02:00
Malicious
Trojan
Spyware
Evader
MassLogger RAT

Comments

Tags

  • exe
  • MassLogger

Details

  • Analysis ID:
    286546
  • API (Web) ID:
    468296
  • Analysis Started:
    2020-09-16 20:05:53 +02:00
  • Analysis Finished:
    2020-09-16 20:23:23 +02:00
  • MD5:
    d408d9b719debd7ac1a42cae6128890f
  • SHA1:
    cabbd9c628578f60bc6d6c09d49123cd9deda8b0
  • SHA256:
    27ed7853f8176995ba85c2fb099e49a6344c9d8afa38b2cb8d137032d96f9db8
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 31/66
malicious
Score: 14/38
malicious
Score: 36/48
malicious

IPs

IP Country Detection
54.235.83.248
United States
54.225.66.103
United States
174.129.214.20
United States

Domains

Name IP Detection
elb097307-934924932.us-east-1.elb.amazonaws.com
174.129.214.20
api.ipify.org
0.0.0.0

URLs

Name Detection
http://api.ipify.org/Pv
http://api.ipify.org/
http://api.ipify.org/p
Click to see the 9 hidden entries
http://www.codeplex.com/DotNetZip.
https://www.youtube.com/watch?v=Qxk6cu21JSg
http://api.ipify.org4
http://api.ipify.orgD
http://elb097307-934924932.us-east-1.elb.amazonaws.com
http://api.ipify8
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://api.ipify.org
http://surdmutablet.com/panel/?/upload

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.vbs
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\appdata\hdhskdhl.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\appdata\hdhskdhl.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 8 hidden entries
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_hdhskdhl.exe_62353bac14fb45e5436d1253beacee2f39bbe7_de5b8f1d_1aa33460\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2116.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Sep 17 03:07:20 2020, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2D8B.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E28.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\B164D5310B\DotNetZip-axk3iqgs.tmp
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\B164D5310B\Log.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\B164D5310B\Screenshot.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
#
C:\Users\user\AppData\Roaming\appdata\hdhskdhl.exe:ZoneIdentifier
empty
#