flash

http://covid19vaccine.hopto.org/march%20OG.exe

Status: finished
Submission Time: 09.03.2021 15:34:15
Malicious
Trojan
Evader
GuLoader

Comments

Tags

Details

  • Analysis ID:
    365439
  • API (Web) ID:
    632946
  • Analysis Started:
    09.03.2021 15:37:23
  • Analysis Finished:
    09.03.2021 15:43:45
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
88/100

malicious
15/84

malicious
9/37

malicious
23/28

malicious

IPs

IP Country Detection
46.183.222.6
Latvia

Domains

Name IP Detection
covid19vaccine.hopto.org
46.183.222.6

URLs

Name Detection
http://covid19vaccine.hopto.org/march%20OG.exe
0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe.l6tc81k.partial
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\march%20OG[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{813E1F67-8130-11EB-90E6-ECF4BB82F7E0}.dat
Microsoft Word Document
#
Click to see the 6 hidden entries
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{813E1F69-8130-11EB-90E6-ECF4BB82F7E0}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe.l6tc81k.partial:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\march OG.exe:Zone.Identifier
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\~DF27A6466E5B9B4110.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF761A8E80D89A84E5.TMP
data
#