top title background image
flash

見積依頼 関電プラント向け.exe

Status: finished
Submission Time: 2025-03-18 07:21:43 +01:00
Malicious
Trojan
Spyware
Evader
Snake Keylogger, VIP Keylogger

Comments

Tags

Details

  • Analysis ID:
    1641279
  • API (Web) ID:
    1641279
  • Original Filename:
    見積依頼 関電プラント向け.bat
  • Analysis Started:
    2025-03-18 07:21:43 +01:00
  • Analysis Finished:
    2025-03-18 07:30:21 +01:00
  • MD5:
    7b8d5f0b6ab9f4dff9723bb7c08fabb7
  • SHA1:
    c0e7808e736d6e848bc2975e464bd05c1621b451
  • SHA256:
    945876d0dbe48c8afe6ac7bff1f31627ee3ec6aa19c6dc6bf06440dbb3fc07fa
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 22/73

IPs

IP Country Detection
37.247.115.2
Turkey
149.154.167.220
United Kingdom
193.122.6.168
United States
Click to see the 1 hidden entries
104.21.96.1
United States

Domains

Name IP Detection
mail.burbaymedikal.com
37.247.115.2
reallyfreegeoip.org
104.21.96.1
api.telegram.org
149.154.167.220
Click to see the 2 hidden entries
checkip.dyndns.com
193.122.6.168
checkip.dyndns.org
0.0.0.0

URLs

Name Detection
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:116938%0D%0ADate%20and%20Time:%2018/03/2025%20/%2014:07:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20116938%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
https://reallyfreegeoip.org/xml/
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
Click to see the 14 hidden entries
http://varders.kozow.com:8081
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://chrome.google.com/webstore?hl=en
https://g.live.com/odclientsettings/ProdV2/C:
http://crl.ver)
http://checkip.dyndns.org/q
http://aborters.duckdns.org:8081
http://anotherarmy.dns.army:8081
https://api.telegram.org/bot
http://51.38.247.67:8081/_send_.php?L
https://reallyfreegeoip.org/xml/8.46.123.189
http://checkip.dyndns.org/
https://g.live.com/odclientsettings/Prod/C:
https://www.office.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\#U898b#U7a4d#U4f9d#U983c #U95a2#U96fb#U30d7#U30e9#U30f3#U30c8#U5411#U3051.exe.log
ASCII text, with CRLF line terminators
#