top title background image
flash

A5uTdwOwJ1.dll

Status: finished
Submission Time: 2021-05-11 12:56:35 +02:00
Malicious
Trojan
Ursnif

Comments

Tags

  • dll
  • Gozi
  • ISFB
  • Ursnif

Details

  • Analysis ID:
    410913
  • API (Web) ID:
    778517
  • Analysis Started:
    2021-05-11 12:56:38 +02:00
  • Analysis Finished:
    2021-05-11 13:05:17 +02:00
  • MD5:
    1752fe2b8419be8241ecd08859a5800f
  • SHA1:
    eb7346a6d5a53ddaf8fd073f266c64d642b40a7d
  • SHA256:
    e81869620b9a18c3702c7be2fcf2e170cbc5c3de1ddbc84ae1fe190b57e917a0
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 60
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Domains

Name IP Detection
outlook.com
40.97.116.82
HHN-efz.ms-acdc.office.com
40.101.138.210
www.outlook.com
0.0.0.0
Click to see the 1 hidden entries
outlook.office365.com
0.0.0.0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FA9A4670-B247-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{FA9A4672-B247-11EB-90EB-ECF4BBEA1588}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Temp\~DF1B654EC27DD768D2.TMP
data
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Local\Temp\~DF7A757557FCA01EC0.TMP
data
#