top title background image
flash

SecuriteInfo.com.W32.AIDetect.malware1.24453.exe

Status: finished
Submission Time: 2021-04-12 15:10:18 +02:00
Malicious
Trojan
Spyware
Evader
Cryptbot Glupteba

Comments

Tags

  • CryptBot

Details

  • Analysis ID:
    385467
  • API (Web) ID:
    673040
  • Analysis Started:
    2021-04-12 15:10:19 +02:00
  • Analysis Finished:
    2021-04-12 15:25:11 +02:00
  • MD5:
    5e3189812e802c0fd68ce592cb1e1999
  • SHA1:
    38552111d3001f4998ab85408601873897653360
  • SHA256:
    f42553b4409992bbddc1df8b716596727762a191055cd2eebb3ced648cf5384f
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 21/68
malicious
Score: 18/48

IPs

IP Country Detection
8.209.66.205
Singapore
8.211.1.15
Singapore
8.209.64.179
Singapore

Domains

Name IP Detection
awumad01.top
8.209.66.205
mardeq01.top
8.209.64.179
aufsvg12.top
8.211.1.15
Click to see the 1 hidden entries
EiodCJGkPupHarewIHgoYXhjJQvRZ.EiodCJGkPupHarewIHgoYXhjJQvRZ
0.0.0.0

URLs

Name Detection
http://awumad01.top/downfiles/lv.exeaC:
http://awumad01.top/download.php?file=lv.exeskQ
http://awumad01.top/download.php?file=lv.exe
Click to see the 19 hidden entries
http://awumad01.top/download.php?file=lv.exeopenBOOLEANBIT
http://awumad01.top/download.php?file=lv.exeqEaRrk
http://awumad01.top/downfiles/lv.exe
http://nsis.sf.net/NSIS_ErrorError
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
http://aufsvg12.top/index.phpz
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
http://www.avast.com0
https://www.autoitscript.com/autoit3/
https://ac.ecosia.org/autocomplete?q=
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
http://www.avast.com0/
http://www.autoitscript.com/autoit3/X
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
http://aufsvg12.top/index.php)
http://mardeq01.top/index.php
http://aufsvg12.top/index.php
https://duckduckgo.com/ac/?q=
https://duckduckgo.com/chrome_newtab

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\Murano.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\New Feature\4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\New Feature\vpn.exe
PE32 executable (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
#
Click to see the 26 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\lv[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Smart Clock\SmartClock.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Mon Apr 12 21:12:24 2021, mtime=Mon Apr 12 21:12:24 2021, atime=Mon Apr 12 01:45:28 2021, length=328704, window=hide
#
C:\Users\user\AppData\Roaming\GcyTFWdPMenYYzQBBj\Velavi.eps
data
#
C:\Users\user\AppData\Roaming\GcyTFWdPMenYYzQBBj\Scoprirvi.eps
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\GcyTFWdPMenYYzQBBj\Notti.eps
data
#
C:\Users\user\AppData\Roaming\GcyTFWdPMenYYzQBBj\Eri.eps
ASCII text, with very long lines, with CRLF, CR, LF line terminators
#
C:\Users\user\AppData\Local\Temp\tZVdZWix.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\nsg8FBB.tmp\UAC.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\vByrel.tmp
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\puElfsbI.tmp
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\gLbcxbHAcf.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\system_info.txt
Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\screenshot.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\cookies\google_chrome_new.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\files_\cookies.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\cmZpVs.tmp
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\ckDbkngmRYjcl.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_Screen_Desktop.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_Information.txt
Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_Cookies\google_chrome_new.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\_Files\_AllCookies_list.txt
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\WqPETvqQ.tmp
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\VYYTkRRhC.tmp
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\UdRFIiqEaRrk\COIkw.tmp
SQLite 3.x database, last written using SQLite version 3032001
#