Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
|
||
|
malicious
Score: 88
|
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
|
|
|
malicious
Score: 100
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior
|
IP | Country | Detection |
---|---|---|
172.104.160.126 | United States | |
239.255.255.250 | Reserved | |
142.250.186.164 | United States |
Name | IP | Detection |
---|---|---|
www.google.com | 142.250.186.164 |
Name | Detection |
---|---|
http://172.104.160.126:8099/payload2.txt | |
http://172.104.160.126:8099 | |
http://172.104.160.126:5000/Uploadss | |
Click to see the 33 hidden entries | |
http://172.104.160. | |
http://172.104.160.126:8099/pay | |
http://172.104.160.126:8099/pay0 | |
http://172.104.160.126:8099/payload2.txton | |
https://aka.ms/vs/17/release/vc_redist.x64.exe | |
https://curl.se/docs/alt-svc.html# | |
https://curl.se/docs/copyright.htmlD | |
https://curl.se/docs/hsts.html# | |
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search | |
http://172.104.160.126:8099/payload2.txtr | |
https://ac.ecosia.org/autocomplete?q= | |
http://172.104.160.126:8099/payload2.txts | |
https://curl.se/P | |
https://curl.se/docs/http-cookies.html# | |
http://172.104.160.126:8099/payload2.txt6 | |
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= | |
http://172.104.160.126:8099/payload2.txto | |
https://curl.se/docs/hsts.html | |
https://duckduckgo.com/chrome_newtab | |
https://curl.se/docs/sslcerts.htmlcurl | |
https://curl.se/docs/sslcerts.html | |
https://www.ecosia.org/newtab/ | |
https://curl.se/docs/alt-svc.html | |
http://172.104.160.126:5000/Upl | |
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= | |
http://172.104.160.126:8099/payload2.txt-oC: | |
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= | |
http://172.104.160.126:80X99 | |
https://curl.se/docs/http-cookies.html | |
https://www.google.com/images/branding/product/ico/googleg_lodp.ico | |
https://duckduckgo.com/ac/?q= | |
https://curl.se/libcurl/c/curl_easy_setopt.html | |
http://172.104.160.126:8099/payload2.txt6ov |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRC0000.tmp |
Microsoft Word 2007+ | # | |
C:\Users\user\AppData\Local\Temp\curl.txt |
PEM certificate | # | |
C:\Users\user\AppData\Local\Temp\mscorsvc.dll |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows | # | |
Click to see the 2 hidden entries | |||
C:\Users\user\AppData\Local\Temp\mscorsvc.txt |
PEM certificate | # | |
C:\Users\user\Downloads\MsftRecoveryToolForCSv2.zip (copy) |
Zip archive data, at least v2.0 to extract, compression method=deflate | # |