flash

173536952-10042021.xls

Status: finished
Submission Time: 04.10.2021 16:57:32
Malicious
Trojan
Exploiter
Evader
Hidden Macro 4.0 Qbot

Comments

Tags

  • Gozi
  • xls

Details

  • Analysis ID:
    496489
  • API (Web) ID:
    864062
  • Analysis Started:
    04.10.2021 16:59:22
  • Analysis Finished:
    04.10.2021 17:15:31
  • MD5:
    0bca9d9a4e10b794ac05375ebc19de86
  • SHA1:
    43983f7c8b45057ec1d732586648f9ac515048f4
  • SHA256:
    4cd16d4f199b5f619a377b3c260f8423a9e814cc680edad1505e4038fc38ddcc
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

malicious
100/100

IPs

IP Country Detection
5.196.247.11
France
190.14.37.165
Panama
188.119.113.3
Russian Federation

URLs

Name Detection
http://www.%s.comPA
http://190.14.37.165/44473.7079048611.dat
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Click to see the 3 hidden entries
http://servername/isapibackend.dll
http://188.119.113.3/44473.7079048611.dat
http://5.196.247.11/44473.7079048611.dat

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\44473.7079048611[1].dat
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\44473.7079048611[2].dat
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\44473.7079048611[3].dat
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 5 hidden entries
C:\Users\user\Celod.wac
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Celod.wac1
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Celod.wac2
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
data
#
C:\Users\user\AppData\Local\Temp\VBE\RefEdit.exd
data
#