top title background image
flash

PurchOrd_75238572.pdf.exe

Status: finished
Submission Time: 2024-11-06 10:40:07 +01:00
Malicious
Trojan
Spyware
Exploiter
Evader
Snake Keylogger

Comments

Tags

  • exe

Details

  • Analysis ID:
    1550008
  • API (Web) ID:
    1550008
  • Analysis Started:
    2024-11-06 10:40:07 +01:00
  • Analysis Finished:
    2024-11-06 10:47:39 +01:00
  • MD5:
    d5c543bf77e87e9bd24b882560519b9c
  • SHA1:
    ca41c520aaf58651c8bf721d95882a98b54461d0
  • SHA256:
    b0b57f31507dda8dd80282cb47f6b1e55bc6b2d03c6e76211a785e3b236cf418
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 17/38

IPs

IP Country Detection
188.114.97.3
European Union
185.78.221.73
Greece
132.226.247.73
United States

Domains

Name IP Detection
www.oleonidas.gr
0.0.0.0
oleonidas.gr
185.78.221.73
reallyfreegeoip.org
188.114.97.3
Click to see the 2 hidden entries
checkip.dyndns.com
132.226.247.73
checkip.dyndns.org
0.0.0.0

URLs

Name Detection
http://reallyfreegeoip.org
https://reallyfreegeoip.org/xml/
https://reallyfreegeoip.org/xml/173.254.250.80
Click to see the 17 hidden entries
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://www.oleonidas.gr
http://checkip.dyndns.com
http://checkip.dyndns.org
https://reallyfreegeoip.org
https://github.com/mgravell/protobuf-net
https://www.oleonidas.gr/slim/Huxdolxdj.mp34Hy
https://www.oleonidas.gr/slim/Huxdolxdj.mp3
http://checkip.dyndns.org/q
https://stackoverflow.com/q/2152978/23354
https://stackoverflow.com/q/11564914/23354;
https://www.oleonidas.gr/slim/Huxdolxdj.mp34H_
https://reallyfreegeoip.org/xml/173.254.250.80$
https://github.com/mgravell/protobuf-netJ
https://stackoverflow.com/q/14436606/23354
https://github.com/mgravell/protobuf-neti
http://checkip.dyndns.org/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VolumeLabel.vbs
ASCII text, with no line terminators
#
C:\Users\user\AppData\Roaming\VolumeLabel.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\VolumeLabel.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#