top title background image
flash

Payment Slip.exe

Status: finished
Submission Time: 2021-09-27 15:27:39 +02:00
Malicious
Trojan
Evader
FormBook

Comments

Tags

  • exe
  • Formbook

Details

  • Analysis ID:
    491436
  • API (Web) ID:
    859005
  • Analysis Started:
    2021-09-27 15:36:57 +02:00
  • Analysis Finished:
    2021-09-27 15:51:26 +02:00
  • MD5:
    3d0d9c87ea732caf417afa0b8af62267
  • SHA1:
    dfb1e57a9cf498310cb7287f4b5792cbcd8b3974
  • SHA256:
    95b6ba2be30399f87d20e021bee29f0eb46773b67407f3ed9987d22610d5249d
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
45.207.75.185
Seychelles
45.39.212.49
United States
75.102.22.71
United States
Click to see the 2 hidden entries
34.102.136.180
United States
198.54.117.211
United States

Domains

Name IP Detection
www.00333v.com
45.39.212.49
www.b0ay.com
45.207.75.185
yuumgo.academy
75.102.22.71
Click to see the 6 hidden entries
www.interweavelife.com
0.0.0.0
www.yuumgo.academy
0.0.0.0
www.axswallet.com
0.0.0.0
interweavelife.com
34.102.136.180
www.relativewifi.com
170.75.251.7
parkingpage.namecheap.com
198.54.117.211

URLs

Name Detection
http://www.yuumgo.academy/qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=iDjkn8VHWDd5B+WgyzOmaYrOSSt87z3Zq6ekoRCiL96i4fBr+80owih/KVqhv8s04Bt0
http://www.00333v.com/qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=EtMhOrO65XWqZe1V/yWpI1DgXrgEJw48YTYdNBZuHNrU3gzc/ZcPLe5HxHKJImHY7C2C
http://www.axswallet.com/qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=WUvvsVcot/hHbudm+hsx8n+3xo5kp+HgCKvLXtoOkn7qJe0B64lU7/LdjKxnrj37XfZ9
Click to see the 31 hidden entries
www.yuumgo.academy/qfff/
http://www.b0ay.com/qfff/?h0Dpm=0w7wS7Gxy1y5PVkYFF5lNTBCNhhGoi1bMCJY/cwIOuW+ZMKS9RSTzNeIK/4fDqykK2MY&zVsX=A0Gd4dmxD4WpN
http://www.founder.com.cn/cn/cThe
http://www.fontbureau.com
http://www.sakkal.com
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.zhongyicts.com.cn
http://www.urwpp.deDPlease
http://www.sandoll.co.kr
http://www.fonts.com
http://www.fontbureau.com/designers8
http://www.galapagosdesign.com/DPlease
http://www.jiyu-kobo.co.jp/
http://www.fontbureau.com/designers/frere-user.html
http://www.founder.com.cn/cn
http://fontfabrik.com
http://www.galapagosdesign.com/staff/dennis.htm
http://www.rspb.org.uk/wildlife/birdguide/name/
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.apache.org/licenses/LICENSE-2.0
http://www.typography.netD
http://www.sajatypeworks.com
http://www.carterandcone.coml
http://www.fontbureau.com/designersG
http://www.interweavelife.com/qfff/?h0Dpm=vpb6mGWiOxgVIXv3RY5+KwgpuQ4maEKqCh4MrndOejQXnr3fUcd6GXEqF18QrWYsNfL0&zVsX=A0Gd4dmxD4WpN
http://www.goodfont.co.kr
http://www.fontbureau.com/designers
http://www.tiro.com
http://www.fontbureau.com/designers?
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers/?

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\tmp4F38.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment Slip.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\uVxomBuy.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Roaming\uVxomBuy.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#