top title background image
flash

book.ps1

Status: finished
Submission Time: 2022-05-10 18:29:33 +02:00
Malicious
Trojan
Evader
GuLoader

Comments

Tags

  • Guloader
  • ps1

Details

  • Analysis ID:
    623683
  • API (Web) ID:
    991180
  • Analysis Started:
    2022-05-10 18:43:16 +02:00
  • Analysis Finished:
    2022-05-10 18:53:35 +02:00
  • MD5:
    10c1a6b6135d5f641ed56cfde0da1967
  • SHA1:
    dbf7d6327c2bf13f3ae772f6eaaa1c0a5fc5473e
  • SHA256:
    75de1e1b097579bf1a18c494042b16192a969dfb0fb9cdb3759d362b7b4b6a5f
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 72
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious

IPs

IP Country Detection
46.4.198.55
Germany

URLs

Name Detection
http://46.4.198.55/10P/Sursdepa.vbsh
http://46.4.198.55x
http://46.4.198.55/10P/Sursdepa.v
Click to see the 20 hidden entries
http://46.4.198.55/10P/Sursdepa.vbs0yj
http://46.4.198.55/10P/Sursdepa.vbs-oSursdepa.vbs$
http://46.4.198.55
http://46.4.198.55/10P/Sursdepa.vbs
http://46.4.198.55/10P/Sursdepa.vbs-oSursdepa.vbs
http://46.4.198.55/10P/Sursdepa.vbs-oSursdepa.vbsPROCE~
https://contoso.com/License
https://github.com/Pester/Pester
http://go.micros
http://nuget.org/NuGet.exe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://contoso.com/Icon
https://nuget.org/nuget.exe
https://contoso.com/
http://schemas.xmlsoap.org/wsdl/
https://go.micro
http://www.apache.org/licenses/LICENSE-2.0.html
http://schemas.xmlsoap.org/soap/encoding/
https://go.microsoft.co
http://pesterbdd.com/images/Pester.png

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\xtg032l3\CSC5582155B3987404B8B25346C869765C.TMP
MSVC .res
#
C:\Users\user\Documents\20220510\PowerShell_transcript.226546.z5QqKyyo.20220510184433.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220510\PowerShell_transcript.226546.4nuvXr5_.20220510184435.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
Click to see the 16 hidden entries
C:\Users\user\Desktop\Sursdepa.vbs
ISO-8859 text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5U6NMO9ACOK0QV40NE2D.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Local\Temp\xtg032l3\xtg032l3.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\xtg032l3\xtg032l3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\xtg032l3\xtg032l3.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\xtg032l3\xtg032l3.0.cs
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ymlh0dzf.0zd.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kqfeipil.5om.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gstzwz1n.ooj.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fhyqppvk.wu3.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eghthspv.xqw.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_31atpqyt.iuu.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\RES5295.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#