top title background image
flash

20qMFnd9tO.exe

Status: finished
Submission Time: 2024-03-29 08:10:05 +01:00
Malicious
Trojan
Spyware
Evader
LummaC

Comments

Tags

  • 32
  • exe
  • trojan

Details

  • Analysis ID:
    1417393
  • API (Web) ID:
    1417393
  • Original Filename:
    0f4a71f80cd80f172817f116318e3fca.exe
  • Analysis Started:
    2024-03-29 08:10:06 +01:00
  • Analysis Finished:
    2024-03-29 08:15:27 +01:00
  • MD5:
    0f4a71f80cd80f172817f116318e3fca
  • SHA1:
    cf0d014f19140c6fb86beeeb078cc3cc9fe99a77
  • SHA256:
    fe2ad4001c817a77de2e7d4ca694833fef66c99beee799333fc84e74da4cad5e
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 28/72
malicious
Score: 14/36
malicious
malicious

IPs

IP Country Detection
172.67.221.128
United States

Domains

Name IP Detection
wagonglidemonkywo.shop
172.67.221.128

URLs

Name Detection
wagonglidemonkywo.shop
enthusiasimtitleow.shop
communicationgenerwo.shop
Click to see the 43 hidden entries
affordcharmcropwo.shop
pillowbrocccolipe.shop
cleartotalfisherwo.shop
worryfillvolcawoi.shop
dismissalcylinderhostw.shop
diskretainvigorousiw.shop
https://wagonglidemonkywo.shop/apiM
https://wagonglidemonkywo.shop/apiy
http://x1.c.lencr.org/0
http://x1.i.lencr.org/0
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
https://support.microsof
http://crt.rootca1.amazontrust.com/rootca1.cer0?
https://wagonglidemonkywo.shop/$
https://wagonglidemonkywo.shop/S
https://wagonglidemonkywo.shop/d
https://wagonglidemonkywo.shop/c
https://wagonglidemonkywo.shop/a
https://support.mozilla.org/products/firefoxgro.all
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
https://wagonglidemonkywo.shop/apiyi
https://wagonglidemonkywo.shop/apiH
http://ocsp.rootca1.amazontrust.com0:
https://duckduckgo.com/ac/?q=
https://wagonglidemonkywo.shop:443/api
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
https://wagonglidemonkywo.shop/j
https://wagonglidemonkywo.shop/
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
https://wagonglidemonkywo.shop/api2
http://crl.rootca1.amazontrust.com/rootca1.crl0
http://upx.sf.net
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
https://wagonglidemonkywo.shop/api
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
https://wagonglidemonkywo.shop/C
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
https://wagonglidemonkywo.shop/A
https://wagonglidemonkywo.shop/8
https://www.ecosia.org/newtab/
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
https://ac.ecosia.org/autocomplete?q=
https://duckduckgo.com/chrome_newtab

Dropped files

No malicious files found. See full and IOC report for all dropped files.