=
flash

rápida confirmación.exe

Status: finished
Submission Time: 13.01.2022 23:41:20
Malicious
Trojan
Evader
DBatLoader FormBook

Comments

Tags

  • exe
  • Formbook

Details

  • Analysis ID:
    552958
  • API (Web) ID:
    920483
  • Analysis Started:
    13.01.2022 23:41:22
  • Analysis Finished:
    13.01.2022 23:56:50
  • MD5:
    3e9eee8807a79ad0134c1a6402927ffa
  • SHA1:
    c89df349f144a0cce0dce3a47efc5a9e37b46d56
  • SHA256:
    c7014edceec0fbe638312dcec8b8d1f0a5bf88dd282fc8ae9ec5d375820d270d
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
38/69

malicious
24/41

malicious

IPs

IP Country Detection
162.159.130.233
United States
162.159.133.233
United States

Domains

Name IP Detection
cdn.discordapp.com
162.159.130.233

URLs

Name Detection
www.my163111.com/ariv/
https://cdn.discordapp.com/attachments/909752051695775778/930682251878998016/Wktcfujipybhvwltyjqwqey
https://cdn.discordapp.com/attachments/909752051695775778/930682251878998016/Wktcfujipybhvwltyjqwqeyhaecfgex

Dropped files

Name File Type Hashes Detection
C:\Users\user\Contacts\Wktcfujipy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\Contacts\Wktcfujipy.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\Wktcfujipybhvwltyjqwqeyhaecfgex[1]
data
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\Wktcfujipybhvwltyjqwqeyhaecfgex[1]
data
#
C:\Users\user\Contacts\ypijufctkW.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\user\\Contacts\\Wktcfujipy.exe">), ASCII text, with CRLF line terminators
#