top title background image
flash

NNOKmCIVoi.exe

Status: finished
Submission Time: 2022-01-11 23:36:16 +01:00
Malicious
Trojan
Evader
Raccoon RedLine SmokeLoader Tofsee Vidar

Comments

Tags

  • exe
  • RedLineStealer

Details

  • Analysis ID:
    551246
  • API (Web) ID:
    918771
  • Analysis Started:
    2022-01-11 23:36:17 +01:00
  • Analysis Finished:
    2022-01-11 23:54:17 +01:00
  • MD5:
    31a601a28f4a81a69c9b09d7249582b9
  • SHA1:
    7aa415965720f2c794fd44a4f147dd7fa756b9b8
  • SHA256:
    4a74dbaaacb20b26d7237b74ced5bd105b0ff3e2eb3ece3eba7bb93bf224b853
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 22/67
malicious
Score: 13/35
malicious
Score: 36/43
malicious
malicious

IPs

IP Country Detection
185.163.204.24
Germany
188.166.28.199
Netherlands
78.46.160.87
Germany
Click to see the 15 hidden entries
185.7.214.171
France
185.186.142.166
Russian Federation
185.233.81.115
Russian Federation
94.102.49.170
Netherlands
185.163.204.22
Germany
5.188.88.184
Russian Federation
8.209.79.15
Singapore
149.28.78.238
United States
162.159.133.233
United States
37.140.192.50
Russian Federation
185.163.45.70
Moldova Republic of
144.76.136.153
Germany
54.38.220.85
France
172.67.139.105
United States
40.93.207.0
United States

Domains

Name IP Detection
unicupload.top
54.38.220.85
host-data-coin-11.com
5.188.88.184
patmushta.info
8.209.79.15
Click to see the 9 hidden entries
cdn.discordapp.com
162.159.133.233
microsoft-com.mail.protection.outlook.com
40.93.207.0
sehfdkfjvgn.xyz
37.140.192.50
goo.su
172.67.139.105
transfer.sh
144.76.136.153
noc.social
149.28.78.238
softwaresworld.net
94.102.49.170
data-host-coin-8.com
5.188.88.184
privacytools-foryou-777.com
0.0.0.0

URLs

Name Detection
http://78.46.160.87/vcruntime140.dll
http://78.46.160.87/softokn3.dll
https://noc.social/@banda5ker
Click to see the 68 hidden entries
http://185.163.204.24//l/f/D2vuR34BZ2GIX1a3wJC_/2e2f0b66d11308f3e72c19e69852b8803e8aa69b
http://78.46.160.87/mozglue.dll
https://185.233.81.115/32739433.dat?iddqd=1
http://unicupload.top/install5.exe
http://185.163.204.24//l/f/D2vuR34BZ2GIX1a3wJC_/425dba20a0279b2f685ed1dbaf2a802bdd836261
http://data-host-coin-8.com/files/9030_1641816409_7037.exe
http://data-host-coin-8.com/game.exe
http://185.163.204.24/
http://78.46.160.87/1125
http://78.46.160.87/msvcp140.dll
http://data-host-coin-8.com/files/9993_1641737702_2517.exe
http://78.46.160.87/
http://78.46.160.87/nss3.dll
http://78.46.160.87/freebl3.dll
http://185.7.214.171:8080/6.php
http://78.46.160.87/565
https://goo.su/abhF
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
https://transfer.sh/get/wP2pzq/1.exe
https://dev.virtualearth.net/mapcontrol/logging.ashx
https://activity.windows.com
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://dev.virtualearth.net/REST/v1/Locations
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
https://%s.dnet.xboxlive.com
https://dev.ditu.live.com/REST/v1/Locations
https://dynamic.t
https://dev.virtualearth.net/REST/v1/Routes/Transit
https://transfer.sh/get/2w2PAQ/joke214324.exe
http://sehfdkfjvgn.xyz/bit.exe
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
https://cdn.discordapp.com/attachments/903666793514672200/930134152861343815/Nidifying.exe
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
https://transfer.sh/get/ealX1m/11.exe
http://schemas.xmlsoap.org/ws/2004/08/ad
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
https://dev.ditu.live.com/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Routes/Driving
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
https://t0.tiles.ditu.live.com/tiles/gen
http://host-data-coin-11.com/
https://dev.virtualearth.net/REST/v1/Routes/Walking
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
https://dev.ditu.live.com/mapcontrol/logging.ashx
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
https://goo.su/XvD
http://www.bingmapsportal.com
https://%s.xboxlive.com
https://softwaresworld.net/wp-content/uploads/2022/8a444287feca136d19310b76ef81e54fc12.exe
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
https://api.ip.sb/ip
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
https://dev.ditu.live.com/REST/v1/Transit/Stops/
https://dev.virtualearth.net/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
https://watson.telemetry.m
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
https://transfer.sh/get/QbPlFD/G.exe
http://crl.ver)
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
http://185.163.204.22/capibar
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\qflfaqod.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\C71D.exe
MS-DOS executable
#
C:\Users\user\AppData\Local\Temp\D78A.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 29 hidden entries
C:\Users\user\AppData\Local\Temp\A7DB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\8F03.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\454.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\3412.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\2655.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\12CC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\eugcwgv
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\eugcwgv:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Windows\SysWOW64\hdysgoc\qflfaqod.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\E3A0.exe
MS-DOS executable
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Logs\dosvc.20220112_073734_069.etl
data
#
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
#
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
#
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
#
C:\Users\user\AppData\Local\Temp\BD87.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2655.exe.log
ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB532.tmp.txt
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA68B.tmp.csv
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4EE3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER45E9.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3AEC.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jan 12 07:38:18 2022, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3466.tmp.txt
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F25.tmp.csv
data
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_3412.exe_35f3196b77cc909196c7cf9fd139feb4da3837e7_5a51878a_15eaf95a\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x927cf06a, page size 16384, DirtyShutdown, Windows version 10.0
#