Click to jump to signature section
Source: hjgesadfseawd.exe | Avira: detected |
Source: C:\Users\user\Desktop\qRsgQELG.log | Avira: detection malicious, Label: TR/AD.BitpyRansom.lcksd |
Source: C:\Users\user\Desktop\NYVCrGVP.log | Avira: detection malicious, Label: TR/PSW.Agent.qngqt |
Source: C:\Users\user\Desktop\RHcbTTvC.log | Avira: detection malicious, Label: TR/AVI.Agent.updqb |
Source: hjgesadfseawd.exe | Malware Configuration Extractor: DCRat {"C2 url": "http://5.252.155.17/3/Proton9Packet/CpuBase5/testBetterlongpollwindows/downloadsGamebetter/Dle/2jsvoiddb/Videodb/wordpresstemp/4Asyncrequest/poll1/httppacketbigloadSqluniversal", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}} |
Source: C:\Users\user\Desktop\NYVCrGVP.log | ReversingLabs: Detection: 70% |
Source: C:\Users\user\Desktop\RHcbTTvC.log | ReversingLabs: Detection: 50% |
Source: C:\Users\user\Desktop\hnkqgLvZ.log | ReversingLabs: Detection: 37% |
Source: C:\Users\user\Desktop\qRsgQELG.log | ReversingLabs: Detection: 33% |
Source: C:\Users\user\Desktop\zzLwAhQo.log | ReversingLabs: Detection: 29% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.6% probability |
Source: C:\Users\user\Desktop\NYVCrGVP.log | Joe Sandbox ML: detected |
Source: C:\Users\user\Desktop\zzLwAhQo.log | Joe Sandbox ML: detected |
Source: C:\Users\user\Desktop\yuAVAyan.log | Joe Sandbox ML: detected |
Source: hjgesadfseawd.exe | Joe Sandbox ML: detected |
Source: hjgesadfseawd.exe | String decryptor: {"0":[],"ff275d84-13f9-47b8-9de6-a3dfeab3ea1e":{"_0":"System drive","_1":""},"31395ecd-4eed-48b9-a47f-81dbcc84ccdf":{"_0":"True","_1":"nkbihfbeogaeaoehlefnkodbefgpgknn:MetaMask\nejbalbakoplchlghecdalmeeeajnimhm:MetaMask\nibnejdfjmmkpcnlpebklmnkoeoihofec:TronLink\nfnjhmkhhmkbjkkabndcnnogagogbneec:Ronin\nkjmoohlgokccodicjjfebfomlbljgfhk:Ronin\nfhbohimaelbohpjbbldcngcnapndodjp:BinanceChain\nbfnaelmomeimhlpmgjnjophhpkkoljpa:Phantom\nnphplpgoakhhjchkkhmiggakijnkhfnd:TONWeb\nffnbelfdoeiohenkjibnmadjiehjhajb:Yoroi\nakoiaibnepcedcplijmiamnaigbepmcb:Yoroi\nafbcbjpbpfadlkmhmclhkeeodmamcflc:MathWallet\nhnfanknocfeofbddgcijnmhnfnkdnaad:Coinbase\nimloifkgjagghnncjkhggdhalmcnfklk:TrezorPM\nilgcnhelpchnceeipipijaljkblbcobl:GAuth\noeljdldpnmdbchonielidgobddffflal:EOS\ncjelfplplebdjjenllpjcblmjkfcffne:JaxxLiberty\nlgmpcpglpngdoalbgeoldeajfclnhafa:SafePal\naholpfdialjgjfhomihkjbmgjidlcdno:Exodus","_2":"All Users","_3":"True"},"a16c206c-6675-4a07-b8b3-f396ed5c6bae":{"_0":"RU;BY;KZ;UA;AM;AZ;KG;MD;TJ;UZ;TM","_1":"Allow"}} |
Source: hjgesadfseawd.exe | String decryptor: ["bKZ2ORpicwitvmDtDSy5iOgGTtdL2AFOIhb6ZmuwJ4jkKbyZ1WzItxwNnTifydpbrTkOLGTahCvno6614ETfL7fVuNSGEP7pOH301jNvDYkqBIirXqkuJKQtyPe7yNWR","584667a1205cae7f6d46624a92e99b079bebeac49e98309173a9eb83ef9ffccd","1","","","5","2","WyIzIiwie1NZU1RFTURSSVZFfS9Vc2Vycy97VVNFUk5BTUV9L0FwcERhdGEvTG9jYWwvc3RhdGljZmlsZS5leGUiLCI1Il0=","WyIxIiwiV3lJaUxDSWlMQ0psZVVsM1NXcHZhV1V4VGxwVk1WSkdWRlZTVTFOV1drWm1VemxXWXpKV2VXTjVPR2xNUTBsNFNXcHZhVnB0Um5Oak1sVnBURU5KZVVscWIybGFiVVp6WXpKVmFVeERTWHBKYW05cFpFaEtNVnBUU1hOSmFsRnBUMmxLTUdOdVZteEphWGRwVGxOSk5rbHVVbmxrVjFWcFRFTkpNa2xxYjJsa1NFb3hXbE5KYzBscVkybFBhVXB0V1ZkNGVscFRTWE5KYW1kcFQybEtNR051Vm14SmFYZHBUMU5KTmtsdVVubGtWMVZwVEVOSmVFMURTVFpKYmxKNVpGZFZhVXhEU1hoTlUwazJTVzVTZVdSWFZXbE1RMGw0VFdsSk5rbHVVbmxrVjFWcFRFTkplRTE1U1RaSmJsSjVaRmRWYVV4RFNYaE9RMGsyU1c1U2VXUlhWV2xtVVQwOUlsMD0iXQ=="] |
Source: hjgesadfseawd.exe | String decryptor: [["http://5.252.155.17/3/Proton9Packet/CpuBase5/testBetterlongpollwindows/downloadsGamebetter/Dle/2jsvoiddb/Videodb/wordpresstemp/4Asyncrequest/poll1/","httppacketbigloadSqluniversal"]] |
Source: hjgesadfseawd.exe | Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
Source: hjgesadfseawd.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 4x nop then jmp 00007FF848F2DFC6h | 0_2_00007FF848F2DE01 |
Source: hjgesadfseawd.exe, s67.cs | Long String: Length: 205744 |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 0_2_00007FF848F33415 | 0_2_00007FF848F33415 |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 0_2_00007FF848F21EC3 | 0_2_00007FF848F21EC3 |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 0_2_00007FF8491011FA | 0_2_00007FF8491011FA |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 0_2_00007FF849100AD4 | 0_2_00007FF849100AD4 |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 0_2_00007FF849100D0D | 0_2_00007FF849100D0D |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 0_2_00007FF8491024FA | 0_2_00007FF8491024FA |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 0_2_00007FF849100888 | 0_2_00007FF849100888 |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 0_2_00007FF8491020C2 | 0_2_00007FF8491020C2 |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 0_2_00007FF8491020F2 | 0_2_00007FF8491020F2 |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 0_2_00007FF849100EFA | 0_2_00007FF849100EFA |
Source: C:\Users\user\Desktop\hjgesadfseawd.exe | Code function: 0_2_00007FF849100FF2 | 0_2_00007FF849100FF2 |
Source: Joe Sandbox View | Dropped File: C:\Users\user\Desktop\IdUljafV.log 4B18BEB315D1D3C80B85F77CAFBD45199C68C11F422D6657355687310929B13E |
Source: Joe Sandbox View | Dropped File: C:\Users\user\Desktop\NYVCrGVP.log 7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A |
Source: NYVCrGVP.log.0.dr | Static PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970 |
Source: RHcbTTvC.log.0.dr | Static PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970 |
Source: zzLwAhQo.log.0.dr | Static PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970 |
Source: yuAVAyan.log.0.dr | Static PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970 |
Source: qRsgQELG.log.0.dr | Static PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970 |
Source: hnkqgLvZ.log.0.dr | Static PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970 |
Source: hjgesadfseawd.exe, 00000000.00000002.2022485525.0000000001072000.00000002.00000001.01000000.00000000.sdmp | Binary or memory string: OriginalFilenameq944h9VdeekiaLj6nIEA0nxdMfYwMGO54 vs hjgesadfseawd.exe |
Source: hjgesadfseawd.exe, 00000000.00000002.2022225026.0000000000FB8000.00000002.00000001.01000000.00000000.sdmp | Binary or memory string: OriginalFilenamehC5ZBAGhgeGr91UA4g4aLnitDd8fsaPt4 vs hjgesadfseawd.exe |
Source: hjgesadfseawd.exe, 00000000.00000002.2022564303.0000000002EB4000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameq944h9VdeekiaLj6nIEA0nxdMfYwMGO54 vs hjgesadfseawd.exe |
Source: hjgesadfseawd.exe, 00000000.00000000.2009863797.0000000000572000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameVisualStudio.Shell.Framework.dll$ vs hjgesadfseawd.exe |
Source: hjgesadfseawd.exe, 00000000.00000002.2022564303.0000000002D93000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameq944h9VdeekiaLj6nIEA0nxdMfYwMGO54 vs hjgesadfseawd.exe |
Source: hjgesadfseawd.exe, 00000000.00000002.2022564303.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameq944h9VdeekiaLj6nIEA0nxdMfYwMGO54 vs hjgesadfseawd.exe |
Source: hjgesadfseawd.exe | Binary or memory string: OriginalFilenameVisualStudio.Shell.Framework.dll$ vs hjgesadfseawd.exe |
Source: hjgesadfseawd.exe | Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
Source: hjgesadfseawd.exe, E32.cs | Cryptographic APIs: 'TransformBlock' |
Source: hjgesadfseawd.exe, E32.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: hjgesadfseawd.exe, E32.cs | Cryptographic APIs: 'TransformFinalBlock', 'TransformBlock' |
Source: NYVCrGVP.log.0.dr, -.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: RHcbTTvC.log.0.dr, -.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: IdUljafV.log.0.dr, -.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: zzLwAhQo.log.0.dr, -.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: yuAVAyan.log.0.dr, -.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: qRsgQELG.log.0.dr, -.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: hnkqgLvZ.log.0.dr, -.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: hjgesadfseawd.exe, s67.cs | Base64 encoded string: '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', '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 |