flash

mU9H96igb3.exe

Status: finished
Submission Time: 14.10.2021 08:27:11
Malicious
Ransomware
Trojan
Evader
Spyware
Remcos GuLoader

Comments

Tags

  • 32
  • exe
  • trojan

Details

  • Analysis ID:
    502656
  • API (Web) ID:
    870229
  • Analysis Started:
    14.10.2021 08:27:11
  • Analysis Finished:
    14.10.2021 08:49:43
  • MD5:
    8777020a37b6797241a489a707b9784b
  • SHA1:
    a1ed1029b967295f9ce5e9d219f41dc6c7fc4d1a
  • SHA256:
    8a45d901cab57a1b65c32aea2452f56436dcf01c37bdf7875838e6054f395d90
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
88/100

System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering

malicious
100/100

malicious
22/67

malicious
9/35

malicious
11/45

malicious

IPs

IP Country Detection
8.6.8.23
United States
83.167.224.147
Czech Republic

Domains

Name IP Detection
Venonletmonitprradministratioran.loseyourip.com
8.6.8.23
implantecapilarpereira.com
83.167.224.147

URLs

Name Detection
http://implantecapilarpereira.com/NetGen
monitprradministratioran.loseyourip.com
http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binx
Click to see the 5 hidden entries
http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.bint
http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binhttp://implantecapilarperei
http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binn
http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.bin
http://implantecapilarpereira.com/NetGeneration10%20Startup_KCFPCd130.binHR

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\install.vbs
data
#
C:\Users\user\AppData\Roaming\Adobes\Dlls.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Adobes\Dlls.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Roaming\Adobes\logs.dat
data
#