top title background image
flash

SCS AWB and Commercial Invoice.exe

Status: finished
Submission Time: 2025-02-04 15:26:18 +01:00
Malicious
Trojan
Spyware
Evader
Snake Keylogger, XWorm

Comments

Tags

  • AsyncRAT
  • exe

Details

  • Analysis ID:
    1606536
  • API (Web) ID:
    1606536
  • Analysis Started:
    2025-02-04 15:26:19 +01:00
  • Analysis Finished:
    2025-02-04 15:38:37 +01:00
  • MD5:
    90d3693237ab538a39b44e399e96b668
  • SHA1:
    d8a59dc7a9d4d8c6f4f0c9a86219746b00a3bbd7
  • SHA256:
    777f42b7f48939008d57d46ff443a292669fbfdbba5c566090448b49fd5a79a3
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 28/70
malicious
Score: 21/38

IPs

IP Country Detection
45.144.214.104
Ukraine
132.226.8.169
United States
104.21.48.1
United States
Click to see the 1 hidden entries
149.154.167.220
United Kingdom

Domains

Name IP Detection
bin14.ydns.eu
45.144.214.104
reallyfreegeoip.org
104.21.48.1
api.telegram.org
149.154.167.220
Click to see the 2 hidden entries
checkip.dyndns.com
132.226.8.169
checkip.dyndns.org
0.0.0.0

URLs

Name Detection
http://reallyfreegeoip.org
https://reallyfreegeoip.org/xml/
https://reallyfreegeoip.org/xml/8.46.123.189p
Click to see the 14 hidden entries
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://api.telegram.org
http://checkip.dyndns.com
http://checkip.dyndns.org
https://api.telegram.org/bot7522567592:AAENXg2LZszJpvr2SAe_G2z5u_54oYaW6pI/sendDocument?chat_id=6009
https://reallyfreegeoip.org
http://checkip.dyndns.org/
http://checkip.dyndns.org/q
https://api.telegram.org/bot7605720342:AAEvFhVZXgNZX-Y_OQTATaG7Q9Glh4EocyI/sendDocument?chat_id=6009622255&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake
https://api.telegram.org/bot7605720342:AAEvFhVZXgNZX-Y_OQTATaG7Q9Glh4EocyI/sendDocument?chat_id=6009
https://api.telegram.org/bot
https://api.telegram.org
https://api.telegram.org/bot7522567592:AAENXg2LZszJpvr2SAe_G2z5u_54oYaW6pI/sendDocument?chat_id=6009622255&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake
https://reallyfreegeoip.org/xml/8.46.123.189

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SCS AWB and Commercial Invoice.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\bdeukn.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\bxhciy.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
#
Click to see the 4 hidden entries
C:\Users\user\AppData\Local\Temp\tmp5EFD.tmp
XML 1.0 document, ASCII text
#
C:\Users\user\AppData\Roaming\HOYVjVj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\HOYVjVj.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\ungagCKiEnZdl.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
#