top title background image
flash

urMpgNNXPM.exe

Status: finished
Submission Time: 2022-01-14 10:49:17 +01:00
Malicious
Trojan
Spyware
Evader
Amadey Raccoon RedLine SmokeLoader Tofse

Comments

Tags

  • exe
  • RaccoonStealer

Details

  • Analysis ID:
    553121
  • API (Web) ID:
    920643
  • Analysis Started:
    2022-01-14 10:50:44 +01:00
  • Analysis Finished:
    2022-01-14 11:08:29 +01:00
  • MD5:
    c94a5671588abb64eab63db753ff3dde
  • SHA1:
    a04fe7f0944c051d9eb60a53e321bae5ad139912
  • SHA256:
    50bee5c11d3905157aa3aa461b9da69cc05c90d748330e98324cc36815610bc0
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 12/93
malicious
Score: 17/43
malicious
malicious

IPs

IP Country Detection
188.166.28.199
Netherlands
185.233.81.115
Russian Federation
185.7.214.171
France
Click to see the 14 hidden entries
185.186.142.166
Russian Federation
185.215.113.35
Portugal
185.163.204.24
Germany
185.163.45.70
Moldova Republic of
185.163.204.22
Germany
141.8.194.74
Russian Federation
104.21.38.221
United States
162.159.133.233
United States
86.107.197.138
Romania
94.142.143.116
Russian Federation
144.76.136.153
Germany
104.47.54.36
United States
54.38.220.85
France
8.209.70.0
Singapore

Domains

Name IP Detection
unicupload.top
54.38.220.85
host-data-coin-11.com
8.209.70.0
patmushta.info
94.142.143.116
Click to see the 6 hidden entries
cdn.discordapp.com
162.159.133.233
microsoft-com.mail.protection.outlook.com
104.47.54.36
goo.su
104.21.38.221
transfer.sh
144.76.136.153
a0621298.xsph.ru
141.8.194.74
data-host-coin-8.com
8.209.70.0

URLs

Name Detection
http://185.163.45.70/capibar
http://data-host-coin-8.com/files/9030_1641816409_7037.exe
http://185.7.214.171:8080/6.php
Click to see the 97 hidden entries
http://185.215.113.35/d2VxjasuwS/index.php?scr=1
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
https://support.google.com/chrome/?p=plugin_divx
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
http://data-host-coin-8.com/game.exe
http://crl.thawte.com/ThawteTimestampingCA.crl0
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
http://schemas.xmlsoap.org/ws/2004/06/addressingex
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
https://support.google.com/chrome/?p=plugin_java
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
https://www.tiktok.com/legal/report
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
https://www.google.com/chrome/static/images/favicons/favicon-16x16.p
https://support.google.com/chrome/?p=plugin_wmp
http://tempuri.org/Entity/Id8Response
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
http://tempuri.org/Entity/Id10Response
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultD
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
https://get.adob
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
https://www.tiktok.com/legal/report/feedback
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
http://tempuri.org/Entity/Id22Response
http://schemas.xmlsoap.org/ws/2002/12/policy
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
http://185.163.204.24:80//l/f/N2z-VH4BZ2GIX1a33Fax/8bcad42ad965e4d081164a067770c0c3dfa4b869pkedcjkde
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
http://tempuri.org/Entity/Id13Response
http://185.163.204.24//l/f/N2z-VH4BZ2GIX1a33Fax/8bcad42ad965e4d081164a067770c0c3dfa4b869
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
http://185.163.204.24/
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
https://support.google.com/chrome/?p=plugin_real
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
http://185.163.204.24/n
http://tempuri.org/Entity/Id21Response
http://schemas.xmlsoap.org/ws/2004/10/wsat
http://tempuri.org/Entity/Id2Response
http://tempuri.org/
https://t.me/capibar
http://www.mozilla.com0
https://telegram.org/img/t_logo.png
http://tempuri.org/Entity/Id12Response
https://duckduckgo.com/ac/?q=
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
https://contextual.media.net/medianet.phpcid=8CU157172&crid=858412214&size=306x271&https=1
https://duckduckgo.com/chrome_newtab
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
http://tempuri.org/Entity/Id24Response
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
http://178.62.113.205/capibar
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
https://support.google.com/chrome/?p=plugin_shockwave
http://schemas.xmlsoap.org/ws/2004/08/addressing
http://a0621298.xsph.ru/9.exe
http://185.163.204.24//l/f/N2z-VH4BZ2GIX1a33Fax/bbdc967e1854b9bf89347672adc7c62bedc561f8
https://www.google.com/chrome/thank-you.htmlstatcb=0&installdataindex=empty&defaultbrowser=0
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
http://tempuri.org/Entity/Id5Response
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
http://schemas.xmlsoap.org/ws/200
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
https://api.ip.sb/ip
http://www.autoitscript.com/autoit3/J
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://tempuri.org/Entity/Id15Response

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\F432.exe
MS-DOS executable
#
C:\Users\user\AppData\Local\Temp\4BB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\6DF6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 45 hidden entries
C:\Users\user\AppData\Local\Temp\7CF6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\82aa4a6c48\mjlooy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\8D62.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\8DA4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\B169.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\D1D3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\EB67.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\F9FC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\mtkthtmd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\brgebic
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\brgebic:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Windows\SysWOW64\cnuxfiv\mtkthtmd.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\ucrtbase.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4BB.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
#
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
#
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\rQF69AzBla
SQLite 3.x database, last written using SQLite version 3032001
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0x4164f616, page size 16384, DirtyShutdown, Windows version 10.0
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7CF6.exe_e1efabdc86e5e7d27089b1be821981d81068140_37bb2cbe_1696affc\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2481.tmp.csv
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2935.tmp.txt
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6DD3.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jan 14 18:52:41 2022, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7565.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER78F0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\1xVPfvJcrg
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\LocalLow\RYwTiizs2t
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\LocalLow\frAQBc8Wsa
SQLite 3.x database, last written using SQLite version 3032001
#
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
#
C:\Users\user\AppData\LocalLow\sG8rM8v\AccessibleHandler.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\AccessibleMarshal.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\IA2Marshal.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\breakpadinjector.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\dI3hX2r.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\LocalLow\sG8rM8v\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\ldap60.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\ldif60.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\nssdbm3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\prldap60.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\LocalLow\sG8rM8v\qipcap.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#