top title background image
flash

file.exe

Status: finished
Submission Time: 2022-10-13 13:02:15 +02:00
Malicious
Ransomware
Trojan
Spyware
Evader
Amadey, Djvu, Fabookie, RedLine, SmokeLo

Comments

Tags

  • exe

Details

  • Analysis ID:
    722349
  • API (Web) ID:
    1089740
  • Analysis Started:
    2022-10-13 13:05:13 +02:00
  • Analysis Finished:
    2022-10-13 13:21:12 +02:00
  • MD5:
    9e93319d00389f1c55611665e404ea9b
  • SHA1:
    23aa8aed6a57519e0c4107fc6f6a7f16efe20741
  • SHA256:
    4e189ba8eaaecc5142cc89fe40d696d216291e906f66b261af8bb0eda2bdcf60
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 19/89
malicious

IPs

IP Country Detection
172.67.203.213
United States
66.96.149.30
United States
176.124.192.220
Russian Federation
Click to see the 8 hidden entries
185.220.204.62
Israel
45.138.74.52
Russian Federation
198.23.58.153
United States
172.67.144.83
United States
179.43.163.115
Panama
140.82.121.3
United States
157.240.17.35
United States
157.240.20.35
United States

Domains

Name IP Detection
pelegisr.com
185.220.204.62
www.rukangiralawchambers.org
0.0.0.0
en.xml-post.xyz
198.135.55.114
Click to see the 14 hidden entries
rukangiralawchambers.org
198.23.58.153
avtlsgosecure.com
176.124.192.220
kkh.eiwagggg.com
172.67.144.83
furubujjul.net
172.67.203.213
jamesmillion.xyz
104.192.2.242
keziheritier.com
66.96.149.30
en.eredirected.xyz
198.135.55.114
github.com
140.82.121.3
libapi.tourl.pics
100.42.65.201
get.geojs.io
104.26.0.100
api.2ip.ua
162.0.217.254
aaa.apiaaaeg.com
45.136.151.102
www.facebook.com
0.0.0.0
star-mini.c10r.facebook.com
157.240.17.35

URLs

Name Detection
http://45.138.74.52/s.exe
http://youyouumenia5.org/
http://guluiiiimnstra.net/
Click to see the 65 hidden entries
http://furubujjul.net/
http://liubertiyyyul.net/
http://nvulukuluir.net/
http://bururutu44org.org/
http://winnlinne.com/lancer/get.php
https://kkh.eiwagggg.com/files/pe/pb1113.exe
http://nuluitnulo.me/
http://179.43.163.115/intersock.exe
http://aaa.apiaaaeg.com/V
https://static.xx.fbcdn.net/rsrc.php/v3/yg/r/l_dEElJiBCo.js?_nc_x=Ij3Wp8lg5Kz
https://static.xx.fbcdn.net/rsrc.php/v3/yH/r/xXDOO3oMCfl.js?_nc_x=Ij3Wp8lg5Kz
http://aaa.apiaaaeg.com/T
https://static.xx.fbcdn.net/rsrc.php/v3/yv/r/GG1Y0sYc7My.js?_nc_x=Ij3Wp8lg5Kz
https://www.facebook.
https://api.2ip.ua/geo.json)d
http://aaa.apiaaaeg.com/check/safeaaeg.comu
https://api.2ip.ua/geo.json
http://aaa.apiaaaeg.com/f
https://static.xx.fbcdn.net/rsrc.php/v3/yj/r/w8iOGQ_Hw3c.js?_nc_x=Ij3Wp8lg5Kz
http://aaa.apiaaaeg.com/check/safe
http://aaa.apiaaaeg.com:80/check/safe
http://aaa.apiaaaeg.com/check/?sid=203601&key=208a26f120e37e37bd82b4530154a948SE
https://static.xx.fbcdn.net/rsrc.php/v3/y0/l/0
http://aaa.apiaaaeg.com/check/safeeR
https://www.facebook.com/ads/manager/account_settings/account_billing
https://pelegisr.com/upload/ChromeSetup.exe
https://static.xx.fbcdn.net/rsrc.php/v3/yL/l/0
https://www.rukangiralawchambers.org/22.exe
http://furubujjul.net/Mozilla/5.0
https://static.xx.fbcdn.net/rsrc.php/v3/yO/r/pslzeMSEB_a.js?_nc_x=Ij3Wp8lg5Kz
http://aaa.apiaaaeg.com/check/?sid=203601&key=208a26f120e37e37bd82b4530154a948
https://static.xx.fbcdn.net/rsrc.php/v3/yS/r/nHDYRDL5JAA.js?_nc_x=Ij3Wp8lg5Kz
https://static.xx.fbcdn.net/rsrc.php/v3/yV/r/tuAGtaeF5Lw.js?_nc_x=Ij3Wp8lg5Kz
http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
https://static.xx.fbcdn.net/rsrc.php/v3/yH/l/0
https://static.xx.fbcdn.net/rsrc.php/v3i7M54/yK/l/en_US/7XFrsMZamvv.js?_nc_x=Ij3Wp8lg5Kz
http://www.openssl.org/support/faq.html
http://aaa.apiaaaeg.com/check/?sid=203601&key=208a26f120e37e37bd82b4530154a948lE
http://aaa.apiaaaeg.com/
https://static.xx.fbcdn.net/rsrc.php/v3/yV/l/0
http://avtlsgosecure.com/
https://static.xx.fbcdn.net/rsrc.php/v3/yy/l/0
https://static.xx.fbcdn.net/rsrc.php/v3/yu/r/G76sQY80s37.js?_nc_x=Ij3Wp8lg5Kz
http://aaa.aptpokmmooootmtmymuok.com/w.facebohttps://wwcebfSTPOGET/device-based/logination/x-www-for
https://www.facebook.com/login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing
https://messenger.com/
https://static.xx.fbcdn.net/rsrc.php/v3/yr/l/0
https://static.xx.fbcdn.net/rsrc.php/v3/yS/r/V_wJ8EQu-vo.js?_nc_x=Ij3Wp8lg5Kz
https://static.xx.fbcdn.net/rsrc.php/v3/yh/l/0
https://static.xx.fbcdn.net/rsrc.php/v3/yC/r/jQFlt4gyp9R.js?_nc_x=Ij3Wp8lg5Kz
https://static.xx.fbcdn.net/rsrc.php/yb/r/hLRJ1GG_y0J.ico
https://static.xx.fbcdn.net/rsrc.php/v3/yW/l/0
https://static.xx.fbcdn.net/rsrc.php/v3/y5/l/0
https://api.2ip.ua/geo.jsons
http://aaa.apiaaaeg.com/P
http://aaa.apiaaaeg.com/Q
https://api.2ip.ua/geo.json5d
https://static.xx.fbcdn.net/rsrc.php/v3/yi/l/0
https://keziheritier.com/jamesp.exe
http://aaa.apiaaaeg.com:80/check/?sid=203601&key=208a26f120e37e37bd82b4530154a948bHU8
http://aaa.apiaaaeg.com/check/safewQ
http://www.autoitscript.com/autoit3/J
http://avtlsgosecure.c24
https://keziheritier.com/7.exe
https://api.2ip.ua/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\2A57.exe
PE32+ executable (GUI) x86-64, for MS Windows
#
C:\Users\user\AppData\Local\Temp\3804.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\543.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
Click to see the 11 hidden entries
C:\Users\user\AppData\Local\Temp\857.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\9763.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\A28F.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\B03C.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\EAA.exe
PE32+ executable (GUI) x86-64, for MS Windows
#
C:\Users\user\AppData\Local\Temp\EB37.exe
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\ECFD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\F4FD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\tfgatra
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\tfgatra:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\udgatra
PE32 executable (GUI) Intel 80386, for MS Windows
#