flash

COVID-19 CDC Secon Outbreak Warning release.exe

Status: finished
Submission Time: 18.11.2020 22:01:37
Malicious
Trojan
Evader
Quasar

Comments

Tags

  • QuasarRAT
  • scr

Details

  • Analysis ID:
    319976
  • API (Web) ID:
    541751
  • Analysis Started:
    18.11.2020 22:01:38
  • Analysis Finished:
    18.11.2020 22:12:59
  • MD5:
    db0d632b83738dfc64013b9b5b7c339e
  • SHA1:
    2f9269bfc05473a6dce71c56d25b37d8b5490bcd
  • SHA256:
    6fb60c80bdc9cd558a384b468dc8b8467fb2e02764728e6a0ebc28ca865f31f6
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
37/70

malicious
5/37

malicious
17/29

IPs

IP Country Detection
208.95.112.1
United States
185.244.26.221
Netherlands

Domains

Name IP Detection
ip-api.com
208.95.112.1
devils.shacknet.us
185.244.26.221

URLs

Name Detection
http://api.ipify.org/
http://ip-api.com4Ck
http://freegeoip.net/xml/
Click to see the 6 hidden entries
http://crl.thawte.com/ThawteTimestampingCA.crl0
http://schemas.datacontract.org/2004/07/
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://ip-api.com/json/
http://ocsp.thawte.com0
http://ip-api.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\COVID-19 CDC Secon Outbreak Warning release.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Winrar\winrar.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Winrar\winrar.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\winrar.exe.log
ASCII text, with CRLF line terminators
#