flash

CDC GUIDES COVID-19 Second Outbreak Warning release.exe

Status: finished
Submission Time: 18.11.2020 05:46:56
Malicious
Trojan
Evader
Quasar

Comments

Tags

Details

  • Analysis ID:
    319216
  • API (Web) ID:
    540232
  • Analysis Started:
    18.11.2020 05:46:57
  • Analysis Finished:
    18.11.2020 06:03:05
  • MD5:
    dc8d9c9a86fe4830053697c1dc59dc6f
  • SHA1:
    a63fa3cc878efe75ecf849111c3e3d417fef4fdd
  • SHA256:
    5dcd1649d97e0da882778ec70677be52b49603b6596b044518f02c278d93d0f2
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
6/48

IPs

IP Country Detection
208.95.112.1
United States
185.244.26.221
Netherlands

Domains

Name IP Detection
ip-api.com
208.95.112.1
devils.shacknet.us
185.244.26.221

URLs

Name Detection
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
http://www.fontbureau.com/designersG
Click to see the 34 hidden entries
http://freegeoip.net/xml/
http://www.fontbureau.com/designers/?
http://crl.m0odoca
http://www.founder.com.cn/cn/bThe
http://schemas.datacontract.org/2004/07/
http://www.fontbureau.com/designers?
http://ocsp.thawte.com0
http://www.tiro.com
http://www.fontbureau.com/designers
http://www.goodfont.co.kr
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
http://www.carterandcone.coml
http://ip-api.com4
http://www.sajatypeworks.com
http://www.typography.netD
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.founder.com.cn/cn/cThe
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
http://www.founder.com.cn/cn
http://www.fontbureau.com/designers/frere-jones.html
http://crl.thawte.com/ThawteTimestampingCA.crl0
http://ip-api.com/json/
http://www.jiyu-kobo.co.jp/
http://ip-api.com
http://www.galapagosdesign.com/DPlease
http://api.ipify.org/
http://www.fontbureau.com/designers8
http://www.fonts.com
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.sakkal.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CDC GUIDES COVID-19 Second Outbreak Warning release.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vlc.exe.log
ASCII text, with CRLF line terminators
#