=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

fooYgfbxno.exe

Status: finished
Submission Time: 2022-05-14 15:27:25 +02:00
Malicious
Trojan
Evader
FormBook

Comments

Tags

  • 32
  • exe
  • trojan

Details

  • Analysis ID:
    626604
  • API (Web) ID:
    994108
  • Analysis Started:
    2022-05-14 15:27:26 +02:00
  • Analysis Finished:
    2022-05-14 15:37:38 +02:00
  • MD5:
    ce42fe431b88922ab59b6fd880cadcf6
  • SHA1:
    652914d960da1d37d270db7f6e3b07c9d4b0e3a9
  • SHA256:
    4d8cc87942499042195cec4fdb2fc5869d4bf98a1d827fd30fb74e82cf0fdc0f
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
22/69

malicious
18/41

malicious

IPs

IP Country Detection
104.21.89.61
United States
185.68.16.179
Ukraine
213.186.33.5
France
Click to see the 3 hidden entries
209.15.40.102
Canada
61.14.208.3
Korea Republic of
206.189.50.60
United States

Domains

Name IP Detection
lotsimprovements.com
209.15.40.102
www.huvao.com
104.21.89.61
www.chambaultfleurs.com
213.186.33.5
Click to see the 8 hidden entries
www.xn--hj2bz6fwvan2be1g5tb.com
61.14.208.3
www.hofwimmer.com
206.189.50.60
www.mentalnayaarifmetika.online
185.68.16.179
www.myamazonloan.net
0.0.0.0
www.lotsimprovements.com
0.0.0.0
www.zyaxious.website
0.0.0.0
www.doxofcolor.com
0.0.0.0
www.xn--ekrt15fxyb2t2c.xn--czru2d
0.0.0.0

URLs

Name Detection
http://www.chambaultfleurs.com/ocgr/?lfvx9=JFNTlvkP_&P2Jl4=TZNys7210trfg8O8WBMuzy6C02I8maceBl4kNVlEZuNH+N4fd/TFP34Py3WDgrqbJJxT
http://www.lotsimprovements.com/ocgr/?P2Jl4=o9xz2vqcTVXu/W078IUcrzT+VrP3S9wZB9suAAi9fTl7LQCsWydvJWt3Uuk2q/fLQQGI&lfvx9=JFNTlvkP_
http://www.xn--hj2bz6fwvan2be1g5tb.com/ocgr/?lfvx9=JFNTlvkP_&P2Jl4=zPygAtD4LGfbsOxaPXlKDZlA/HZsirEX7sJv7vNHedMyDqAMsgZk6w8aA/BuIJhq09F8
Click to see the 4 hidden entries
http://www.huvao.com/ocgr/?P2Jl4=1BqqsZcQDAJnvcG+ktWW1SuLtWUnTVqW01xF9ocnHpFG4dYykDk5mjpX7chd6+Nfhcmp&lfvx9=JFNTlvkP_
www.mentalnayaarifmetika.online/ocgr/
http://www.mentalnayaarifmetika.online/ocgr/?P2Jl4=WCPK4waC2+ZoHrOc/rbcYrxYoSsYkto1AfFtfo68nJJBD8+b6aAxZ/giJh8W0WW05dhF&lfvx9=JFNTlvkP_
https://adm.tools/support/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fooYgfbxno.exe.log
ASCII text, with CRLF line terminators
#