flash

kj9Xrb81w4.exe

Status: finished
Submission Time: 16.11.2020 13:04:33
Malicious
E-Banking Trojan
Trojan
Evader
Ursnif

Comments

Tags

  • Gozi

Details

  • Analysis ID:
    317916
  • API (Web) ID:
    537638
  • Analysis Started:
    16.11.2020 13:05:06
  • Analysis Finished:
    16.11.2020 13:11:47
  • MD5:
    172817a62cbabbf9523d783346369ae8
  • SHA1:
    be4d9d258d2bbddacebebdd4d004507ee02da62c
  • SHA256:
    c097474f5af68187b791c8daca47f6f0747773b2465e0b2f231be9980f9a96a3
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
41/72

malicious
9/37

malicious
15/48

IPs

IP Country Detection
72.5.161.20
United States

Domains

Name IP Detection
qrodericky94.company
72.5.161.20

URLs

Name Detection
http://qrodericky94.company/favicon.ico
http://qrodericky94.company/images/wrgxWqS2B_2FXAZ/RkKR70xQvdnxfJUmvC/TVUYhY2DO/WLbUcyMI_2FTThfQYEE_/2BU78gNdVVuZcWEXbDV/7hthk5MC6mP6vxNtj6FzRJ/USWFcWCUhvAUo/P0kLxjxz/qeKOJy9fyAy57zpUs1fQrXw/iDvqKkF7/K.avi
http://qrodericky94.company/images/wrgxWqS2B_2FXAZ/RkKR70xQvdnxfJUmvC/TVUYhY2DO/WLbUcyMI_2FTThfQYEE_
Click to see the 7 hidden entries
http://www.wikipedia.com/
http://www.amazon.com/
http://www.nytimes.com/
http://www.live.com/
http://www.reddit.com/
http://www.twitter.com/
http://www.youtube.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9CA8EEE7-284F-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9CA8EEE9-284F-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
Click to see the 11 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF3DDE10A1CC16068A.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFFD7A18A4A56B40CB.TMP
data
#