top title background image
flash

http://covid19vaccine.hopto.org/march%20OG.exe

Status: finished
Submission Time: 2021-03-09 15:34:15 +01:00
Malicious
Trojan
Evader
GuLoader

Comments

Tags

Details

  • Analysis ID:
    365439
  • API (Web) ID:
    632946
  • Analysis Started:
    2021-03-09 15:37:23 +01:00
  • Analysis Finished:
    2021-03-09 15:43:45 +01:00
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 88
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 15/84
malicious
Score: 9/37
malicious
Score: 23/28
malicious

IPs

IP Country Detection
46.183.222.6
Latvia

Domains

Name IP Detection
covid19vaccine.hopto.org
46.183.222.6

URLs

Name Detection
http://covid19vaccine.hopto.org/march%20OG.exe
0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe.l6tc81k.partial
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\march%20OG[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{813E1F67-8130-11EB-90E6-ECF4BB82F7E0}.dat
Microsoft Word Document
#
Click to see the 6 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{813E1F69-8130-11EB-90E6-ECF4BB82F7E0}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe.l6tc81k.partial:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe:Zone.Identifier
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF27A6466E5B9B4110.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF761A8E80D89A84E5.TMP
data
#