=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe

Status: finished
Submission Time: 2022-05-12 07:52:08 +02:00
Malicious
Trojan
Evader
Nanocore

Comments

Tags

  • exe
  • NanoCore
  • RAT

Details

  • Analysis ID:
    624876
  • API (Web) ID:
    992380
  • Analysis Started:
    2022-05-12 07:55:26 +02:00
  • Analysis Finished:
    2022-05-12 08:09:23 +02:00
  • MD5:
    df1dc1a245d93014003e9ecc4f654602
  • SHA1:
    b2f5da6a917d9535a623de61c603d03f0d225fb4
  • SHA256:
    8fa3b2eb7650ac7ff7dbbeed506e3f17b805d64d6932715f8885508fb6f988c6
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
60/70

malicious
30/35

malicious
40/41

malicious

malicious

IPs

IP Country Detection
91.109.186.5
France

Domains

Name IP Detection
khalil3131.ddns.net
91.109.186.5

URLs

Name Detection
khalil3131.ddns.net
127.0.0.1

Dropped files

Name File Type Hashes Detection
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exe.log
ASCII text, with CRLF line terminators
#
Click to see the 6 hidden entries
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp187C.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Non-ISO extended-ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\tmp21A4.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
data
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
ASCII text, with no line terminators
#