flash

Justificante.scr

Status: finished
Submission Time: 24.11.2021 11:51:33
Malicious
Trojan
Evader
GuLoader

Comments

Tags

Details

  • Analysis ID:
    527776
  • API (Web) ID:
    895300
  • Analysis Started:
    24.11.2021 11:51:33
  • Analysis Finished:
    24.11.2021 11:58:18
  • MD5:
    debed1988744625a65d94bdbe9525b94
  • SHA1:
    db60e778e0099e265d1066fc453a698a94581f61
  • SHA256:
    fc2ad0d57328f8bf9b37d037e30891e64a2feead23884bd2e52e07794275e758
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301

malicious
92/100

malicious
37/68

malicious
12/35

malicious
22/44

IPs

IP Country Detection
142.250.181.238
United States

Domains

Name IP Detection
drive.google.com
142.250.181.238

URLs

Name Detection
https://drive.google.com/:j;
https://drive.google.com/Z
https://drive.google.com/z
Click to see the 20 hidden entries
https://drive.google.com/8
http://www.topqualityfreeware.com/
https://drive.google.com/
https://drive.google.com/$jI
https://drive.google.com/ertificates
https://drive.google.com/t
https://drive.google.com/2
https://drive.google.com/R
https://drive.google.com/r
https://drive.google.com/0
https://drive.google.com/Tp6
https://drive.google.com/crosoft
https://drive.google.com/Ni
https://drive.google.com/j
http://topqualityfreeware.com
https://drive.google.com/_1
https://drive.google.com/ificate
https://drive.google.com/B
https://drive.google.com/a
https://csp.withgoogle.com/csp/report-to/gse_l9ocaq

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\~DF27D39ECE608940C1.TMP
Composite Document File V2 Document, Cannot read section info
#