top title background image
flash

741B26251FA1FBA9C4D5EB7AACA544F07859F82C296B8.exe

Status: finished
Submission Time: 2021-05-04 07:08:26 +02:00
Malicious
Trojan
Evader
Nanocore

Comments

Tags

  • exe
  • NanoCore
  • RAT

Details

  • Analysis ID:
    403532
  • API (Web) ID:
    709217
  • Analysis Started:
    2021-05-04 07:14:23 +02:00
  • Analysis Finished:
    2021-05-04 07:28:29 +02:00
  • MD5:
    cdda16bd52c7c602b534593be9149a42
  • SHA1:
    5789cb8b8b1493de3733c66cd52d8b0180be6cd4
  • SHA256:
    741b26251fa1fba9c4d5eb7aaca544f07859f82c296b8c01d2339a4ea2d06c58
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 41/69
malicious
Score: 9/37
malicious
Score: 21/29

IPs

IP Country Detection
79.134.225.40
Switzerland
79.134.225.82
Switzerland

Domains

Name IP Detection
strongodss.ddns.net
79.134.225.82

URLs

Name Detection
79.134.225.40
strongodss.ddns.net
https://go.micro
Click to see the 2 hidden entries
https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
http://crl.mi

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\741B26251FA1FBA9C4D5EB7AACA544F07859F82C296B8.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\gKpxRZsP.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\gKpxRZsP.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 17 hidden entries
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
data
#
C:\Users\user\AppData\Local\Temp\tmp30C2.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eywfmlgy.1th.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gof3hya4.2ip.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2xejyx0.1ov.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y5ptkebd.tnb.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Temp\tmpB146.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmpB52F.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
#
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\Documents\20210504\PowerShell_transcript.813435.K7iDO9IF.20210504071538.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20210504\PowerShell_transcript.813435.WJkwONF7.20210504071534.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#