flash

Proforma Invoice and Bank swift-REG.PI-0086547654.exe

Status: finished
Submission Time: 10.06.2021 14:34:38
Malicious
Trojan
Evader
FormBook

Comments

Tags

Details

  • Analysis ID:
    432567
  • API (Web) ID:
    800171
  • Analysis Started:
    10.06.2021 14:34:39
  • Analysis Finished:
    10.06.2021 14:45:04
  • MD5:
    b148ae414eb8a1b34a15cdb32c21f9ee
  • SHA1:
    25b78f76010cc34843352c78d4f8e07a28b46b32
  • SHA256:
    193788545c12c697fe660e9dd178e5d97478d5b90d5b0096f1cd6a9b641d48e9
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
20/68

malicious
14/47

IPs

IP Country Detection
37.48.65.148
Netherlands
104.232.96.207
United States
23.227.38.74
Canada
Click to see the 5 hidden entries
69.162.102.218
United States
121.254.178.252
Korea Republic of
85.159.66.93
Turkey
162.0.229.108
Canada
35.205.61.67
United States

Domains

Name IP Detection
www.theyogirunner.com
104.232.96.207
www.kladios.com
121.254.178.252
closetofaurora.com
162.0.229.108
Click to see the 11 hidden entries
www.pecon.pro
37.48.65.148
shops.myshopify.com
23.227.38.74
www.kingguardgroup.com
69.162.102.218
natroredirect.natrocdn.com
85.159.66.93
www.closetofaurora.com
0.0.0.0
www.letstrumpbiden.com
0.0.0.0
www.28ji.site
0.0.0.0
www.hireinone.xyz
0.0.0.0
www.goodlukc.com
0.0.0.0
www.oilleakgames.com
0.0.0.0
www.rebeccannemontgomery.net
35.205.61.67

URLs

Name Detection
http://www.kingguardgroup.com/dp3a/?GR-d=+9xVWhQ3YZdKS9LSdJD9Q5IGOGjZWYGRUC/PBrhb5+8EiR866LajmsNw/hU5zOKELtJS&nPTdU=-ZoHnNt0frfd2Hn
http://www.hireinone.xyz/dp3a/?GR-d=gNGby8oVX6PgZB5GWA7CusOGqzi3GywYGs/3OTvKjB1NulubMkWwqj/edMXwHBCob9Lh&nPTdU=-ZoHnNt0frfd2Hn
http://www.28ji.site/dp3a/?nPTdU=-ZoHnNt0frfd2Hn&GR-d=/zMHFgDZZhoYLr+uNA/LZaIwAqqHNoUyccNHiXKU1Oc8waRhqa0xV5lesUE3sQ0wja+H
Click to see the 36 hidden entries
http://www.pecon.pro/dp3a/?nPTdU=-ZoHnNt0frfd2Hn&GR-d=qfgFr8ieK4pb0oEJahXrwfByJwdYjuIB81dpFpRA2DwOSKuw2QjIPW4nYRzvvZDFGDPJ
http://www.theyogirunner.com/dp3a/?nPTdU=-ZoHnNt0frfd2Hn&GR-d=rT959XFbghPJVv5hpca1PvfPcVCtnqQ7MGzQwkslu+qbfaQ1OXZa8AaW+DloN+T+QKhF
http://www.kladios.com/dp3a/?GR-d=9p/K3n16Mfij3JUlf4zaR/Rujbmkv/CDhZs1M9Rj6A9SEkbuvv/NT9LewVshmGfbFjhm&nPTdU=-ZoHnNt0frfd2Hn
http://www.closetofaurora.com/dp3a/?GR-d=gKBh5mJw+OBG/cLQbNfpnnQYqc+45jCeSmhHkERkUIltQJh3+jBq8zykiXiJ5ld+SMHF&nPTdU=-ZoHnNt0frfd2Hn
www.rebeccannemontgomery.net/dp3a/
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
http://www.fontbureau.com/designersG
http://www.fontbureau.com/designers/?
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers?
http://www.tiro.com
http://www.fontbureau.com/designers
http://nsis.sf.net/NSIS_ErrorError
http://www.goodfont.co.kr
http://www.rebeccannemontgomery.net/dp3a/?GR-d=ayCA4X1Kl09ymHiLnx81tYxQpS3YxUUFxhK9zdH9kq/gCaIMsyBIYQcEhhLQSA14VAsf&nPTdU=-ZoHnNt0frfd2Hn
http://www.carterandcone.coml
http://www.sajatypeworks.com
http://www.typography.netD
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.founder.com.cn/cn/cThe
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
http://www.founder.com.cn/cn
http://www.fontbureau.com/designers/frere-user.html
http://nsis.sf.net/NSIS_Error
http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
http://www.jiyu-kobo.co.jp/
http://www.galapagosdesign.com/DPlease
http://www.fontbureau.com/designers8
http://www.%s.comPA
http://www.fonts.com
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://www.sakkal.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\6jlp0t221b5inmotwb6
data
#
C:\Users\user\AppData\Local\Temp\dceotuvjnitpz
data
#
C:\Users\user\AppData\Local\Temp\nsp24F6.tmp
data
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Local\Temp\nsp24F7.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#