flash

drfone.exe

Status: finished
Submission Time: 24.12.2020 09:19:48
Malicious
E-Banking Trojan
Trojan
Evader
Ursnif

Comments

Tags

  • gozi
  • isfb
  • OOONovasoft
  • signed
  • ursnif

Details

  • Analysis ID:
    333865
  • API (Web) ID:
    569612
  • Analysis Started:
    24.12.2020 09:19:51
  • Analysis Finished:
    24.12.2020 09:31:24
  • MD5:
    545f38fbb74881142712052a5b6eabce
  • SHA1:
    4cbaf1ecb48629b163f4387605c8a9011e89183c
  • SHA256:
    7b8ef3f064d0de0c27d56ff4df7d360f0d546d32aabbdf96a746bab5c84277ec
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports
New

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
7/48

IPs

IP Country Detection
45.142.215.100
Russian Federation
45.133.216.84
Russian Federation

Domains

Name IP Detection
babsgans.website
45.142.215.100
hapynewyear.xyz
45.133.216.84

URLs

Name Detection
http://search.chol.com/favicon.ico
http://www.mercadolivre.com.br/
http://www.merlin.com.pl/favicon.ico
Click to see the 97 hidden entries
http://search.ebay.de/
http://www.mtv.com/
http://www.rambler.ru/
http://www.nifty.com/favicon.ico
http://www.dailymail.co.uk/
http://www3.fnac.com/favicon.ico
http://crl.microsoft
http://buscar.ya.com/
http://search.yahoo.com/favicon.ico
http://www.sogou.com/favicon.ico
http://www.fontbureau.com/designers
http://asp.usatoday.com/
http://fr.search.yahoo.com/
http://rover.ebay.com
http://in.search.yahoo.com/
http://img.shopzilla.com/shopzilla/shopzilla.ico
http://search.ebay.in/
http://image.excite.co.jp/jp/favicon/lep.ico
https://nuget.org/nuget.exe
http://www.galapagosdesign.com/DPlease
http://%s.com
http://msk.afisha.ru/
https://hapynewyear.xyz/index.htmz
http://www.zhongyicts.com.cn
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.reddit.com/
http://busca.igbusca.com.br//app/static/images/favicon.ico
https://hapynewyear.xyz/index.htmr
http://search.rediff.com/
http://www.autoitscript.com/autoit3/J
http://www.ya.com/favicon.ico
http://www.etmall.com.tw/favicon.ico
http://it.search.dada.net/favicon.ico
http://pesterbdd.com/images/Pester.png
http://search.naver.com/
http://www.google.ru/
http://cps.letsencrypt.org0
http://search.hanafos.com/favicon.ico
http://www.apache.org/licenses/LICENSE-2.0.html
http://cgi.search.biglobe.ne.jp/favicon.ico
http://www.abril.com.br/favicon.ico
http://search.daum.net/
https://contoso.com/Icon
http://search.naver.com/favicon.ico
http://search.msn.co.jp/results.aspx?q=
http://www.clarin.com/favicon.ico
http://buscar.ozu.es/
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
https://hapynewyear.xyz/index.htmRoot
http://kr.search.yahoo.com/
http://search.about.com/
http://busca.igbusca.com.br/
http://www.microsofttranslator.com/BVPrev.aspx?ref=IE8Activity
http://www.ask.com/
http://www.priceminister.com/favicon.ico
https://github.com/Pester/Pester
http://www.cjmall.com/
http://search.centrum.cz/
http://www.carterandcone.coml
http://suche.t-online.de/
http://www.google.it/
http://search.auction.co.kr/
http://www.ceneo.pl/
http://www.amazon.de/
http://sads.myspace.com/
http://busca.buscape.com.br/favicon.ico
http://www.pchome.com.tw/favicon.ico
http://browse.guardian.co.uk/favicon.ico
http://google.pchome.com.tw/
http://list.taobao.com/browse/search_visual.htm?n=15&q=
http://www.rambler.ru/favicon.ico
http://uk.search.yahoo.com/
http://espanol.search.yahoo.com/
http://www.ozu.es/favicon.ico
http://search.sify.com/
http://openimage.interpark.com/interpark.ico
http://search.yahoo.co.jp/favicon.ico
http://search.ebay.com/
http://www.gmarket.co.kr/
http://www.founder.com.cn/cn/bThe
http://ocsp.sectigo.com0
http://search.nifty.com/
http://searchresults.news.com.au/
http://www.google.si/
http://www.google.cz/
http://www.soso.com/
http://www.univision.com/
http://search.ebay.it/
http://www.amazon.com/
http://images.joins.com/ui_c/fvc_joins.ico
http://www.asharqalawsat.com/
http://busca.orange.es/
http://cnweb.search.live.com/results.aspx?q=
http://www.twitter.com/
http://auto.search.msn.com/response.asp?MT=
http://search.yahoo.co.jp
http://www.target.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\r1g0ykja\r1g0ykja.0.cs
C++ source, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators
#
C:\Users\user\AppData\Local\Temp\xqhvpwja\xqhvpwja.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{62186B86-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
Click to see the 54 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{62186B88-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{62186B8A-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{62186B8C-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{681EFB23-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{681EFB25-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{681EFB27-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{681EFB29-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{6F48692F-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{6F486931-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{6F486933-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{6F486935-460C-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\wlm7n14\imagestore.dat
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\index[1].htm
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90\favicon[1].ico
MS Windows icon resource - 1 icon, 16x16, 16 colors, 4 bits/pixel
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90\index[1].htm
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\B7F7.bin
Zip archive data (empty)
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\RESE3A5.tmp
data
#
C:\Users\user\AppData\Local\Temp\RESF2B8.tmp
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_twtk1mxv.bss.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wj54lnla.ppb.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\r1g0ykja\CSC64F5131A8743441E92CD84029AD3C82.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\r1g0ykja\r1g0ykja.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\r1g0ykja\r1g0ykja.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\r1g0ykja\r1g0ykja.out
ASCII text, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\xqhvpwja\CSC8240488428EC4188955E47238990560.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\xqhvpwja\xqhvpwja.0.cs
C++ source, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators
#
C:\Users\user\AppData\Local\Temp\xqhvpwja\xqhvpwja.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\xqhvpwja\xqhvpwja.out
ASCII text, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\~DF11859F0CE418C879.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF1646937B045BC3DA.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF1B1DBFA3EAAA43B8.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF353841425800A3EB.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF64557C5276C97698.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF709AE905AEF802CA.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFA3603797F71A738A.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFA4C86E0B864A7E93.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFAF1A2F0656D99F13.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFBE97E048CA6F4955.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFC2435DFFEF16A3A4.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DFE5D4803967180654.TMP
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J3HTYE83WO6W3OX06V2A.temp
data
#
C:\Users\user\Documents\20201224\PowerShell_transcript.226533.mTDKxmTU.20201224092137.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#