flash

SecuriteInfo.com.Variant.Razy.980776.18296.dll

Status: finished
Submission Time: 28.10.2021 05:02:16
Malicious
E-Banking Trojan
Trojan
Evader
Dridex

Comments

Tags

  • dll

Details

  • Analysis ID:
    510707
  • API (Web) ID:
    878264
  • Analysis Started:
    28.10.2021 05:24:11
  • Analysis Finished:
    28.10.2021 05:35:08
  • MD5:
    f9089433cce6fd7f480d5e7335190ef5
  • SHA1:
    0ca2bb79d7b1646f56a18ff24fa0014952455597
  • SHA256:
    7ee50b399b3fde0db3369c94b06e341db931748740da0c96ba4a14db3fbe50ef
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
84/100

clean
0/100

malicious
11/28

IPs

IP Country Detection
45.77.0.96
United States
185.56.219.47
Italy
192.46.210.220
United States
Click to see the 1 hidden entries
143.244.140.214
United States

URLs

Name Detection
https://192.46.210.220/
https://45.77.0.96:6891/:
https://185.56.219.47:8116/H
Click to see the 62 hidden entries
https://192.46.210.220/Nf
https://185.56.219.47:8116/ad=
https://143.244.140.214:808/9%
https://192.46.210.220/aenh.dll
https://192.46.210.220/ig$
https://192.46.210.220/?g
https://143.244.140.214:808/5
https://185.56.219.47:8116/
https://192.46.210.220/Certification
https://192.46.210.220/6g
https://45.77.0.96/
https://143.244.140.214:808/#
https://143.244.140.214:808/%
https://185.56.219.47:8116/4ad=
https://143.244.140.214:808/l9%
https://185.56.219.47/#
https://185.56.219.47:8116/r
https://143.244.140.214:808/ad=
https://192.46.210.220/Wfv
https://192.46.210.220/#g
https://45.77.0.96:6891/h
https://45.77.0.96:6891/l
https://143.244.140.214:808/ll
https://185.56.219.47:8116/4ti
https://143.244.140.214:808/zyJ
https://182.46.210.220/
https://192.46.210.220/%
https://185.56.219.47:8116/soft
https://192.46.210.220/1
https://143.244.140.214:808/la
https://185.56.219.47:8116/ll
https://185.56.219.47:8116/nd.
https://143.244.140.214/
https://143.244.140.214:808/My
https://185.56.219.47/
https://192.46.210.220/(g
https://192.46.210.220/D
https://192.46.210.220/L
https://192.46.210.220/E
https://185.56.219.47:8116/f
https://45.77.0.96:6891/V
https://185.56.219.47:8116/e
https://143.244.140.214:808/b
https://143.244.140.214:808/ll9%
https://45.77.0.96:6891/graphy
https://143.244.140.214:808/
https://45.77.0.96:6891/
https://143.244.140.214/f
https://185.56.219.47:8116/Bd
https://185.56.219.47:8116/0
https://192.46.210.220/V
https://192.46.210.220/aenh.dllU
https://192.46.210.220/_
https://185.56.219.47:8116/Vdv
https://192.46.210.220/l
https://192.46.210.220/ography
https://192.46.210.220/aenh.dllltb
https://193.244.140.214:808/
https://143.244.140.214:808/~
https://192.46.210.220/1g
https://45.77.0.96:6891/Microsoft
https://192.46.210.220//)

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#