flash

invoice pdf.exe

Status: finished
Submission Time: 04.05.2021 07:01:33
Malicious
Trojan
Evader
Nanocore

Comments

Tags

  • exe
  • NanoCore
  • RAT

Details

  • Analysis ID:
    403525
  • API (Web) ID:
    709204
  • Analysis Started:
    04.05.2021 07:04:42
  • Analysis Finished:
    04.05.2021 07:17:37
  • MD5:
    0f14a940f2fb7ae9a30b2f0079b13630
  • SHA1:
    183f706b9e8ebfa0f2c412477bed2fb4e798f35d
  • SHA256:
    910f9987b35db8d13a06bb8feae8274601bb8afcdca3afcfed64ca8a66f498a4
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

IPs

IP Country Detection
23.105.131.171
United States

URLs

Name Detection
23.105.131.171
http://pesterbdd.com/images/Pester.png
Click to see the 10 hidden entries
http://schemas.xmlsoap.org/soap/encoding/
http://www.apache.org/licenses/LICENSE-2.0.html
https://go.micro
http://schemas.xmlsoap.org/wsdl/
http://tempuri.org/Shops_DBDataSet.xsd9WinForms_RecursiveFormCreate5WinForms_SeeInnerExceptionGPrope
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://crl.microsoft.
https://github.com/Pester/Pester
https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
http://tempuri.org/Shops_DBDataSet.xsd

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\tmpF83F.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
data
#
C:\Users\user\AppData\Roaming\LXAiHtFKpy.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 14 hidden entries
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\invoice pdf.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0g4lbt43.jbb.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4bktld3a.0jy.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bhb5ejnf.e5l.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hmb0hei1.otk.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ttd1tjgn.opd.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x2vim5c4.uad.psm1
very short file (no magic)
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
data
#
C:\Users\user\AppData\Roaming\LXAiHtFKpy.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\Documents\20210504\PowerShell_transcript.878164.5hEIKAHF.20210504070541.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210504\PowerShell_transcript.878164.VbVKTSW+.20210504070538.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210504\PowerShell_transcript.878164.wKoRBQM+.20210504070540.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#