Sample Name: | SecuriteInfo.com.Variant.Strictor.47541.25845.4974 (renamed file extension from 4974 to exe) |
Analysis ID: | 629537 |
MD5: | 66327cb157de8ff34bd61a710d30d814 |
SHA1: | 5affa0807d36dc064de6daf336ef9b074e6ef308 |
SHA256: | 4ff209aea9caf232f64a0a1670504bc6f37d079fa66dbe303439a93e00c3cdc6 |
Tags: | exeFormbook |
Infos: | |
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
AV Detection |
|
---|
Source: |
Malware Configuration Extractor: |
Source: |
ReversingLabs: |
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
Source: |
Avira URL Cloud: |
Source: |
ReversingLabs: |
Source: |
Joe Sandbox ML: |
Source: |
Joe Sandbox ML: |
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
Source: |
Static PE information: |
Source: |
Static PE information: |
Source: |
Binary string: |
||
Source: |
Binary string: |
Source: |
Code function: |
6_2_0040C7F4 |
Networking |
|
---|
Source: |
URLs: |
Source: |
String found in binary or memory: |
Source: |
Binary or memory string: |
E-Banking Fraud |
|
---|
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
System Summary |
|
---|
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
Source: |
Static PE information: |
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
Source: |
Code function: |
0_2_04FD5960 | |
Source: |
Code function: |
0_2_04FE58D7 | |
Source: |
Code function: |
0_2_04FF0040 | |
Source: |
Code function: |
0_2_04FF5728 | |
Source: |
Code function: |
0_2_04FFAD08 | |
Source: |
Code function: |
0_2_04FD5959 | |
Source: |
Code function: |
6_2_00401030 | |
Source: |
Code function: |
6_2_0041D0E2 | |
Source: |
Code function: |
6_2_004090A0 | |
Source: |
Code function: |
6_2_0041D15B | |
Source: |
Code function: |
6_2_00402D90 | |
Source: |
Code function: |
6_2_00402FB0 | |
Source: |
Code function: |
22_2_02F12C10 | |
Source: |
Code function: |
22_2_02F18E08 | |
Source: |
Code function: |
22_2_056F5960 | |
Source: |
Code function: |
22_2_057058D7 | |
Source: |
Code function: |
22_2_05710040 | |
Source: |
Code function: |
22_2_05715728 | |
Source: |
Code function: |
22_2_05715717 | |
Source: |
Code function: |
22_2_05710007 |
Source: |
Code function: |
0_2_04FFFB18 |
Source: |
Code function: |
6_2_00418AA0 | |
Source: |
Code function: |
6_2_00418B50 | |
Source: |
Code function: |
6_2_00418BD0 | |
Source: |
Code function: |
6_2_00418C80 | |
Source: |
Code function: |
6_2_00418B4A | |
Source: |
Code function: |
6_2_00418BCA | |
Source: |
Code function: |
6_2_00418C7A |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
Source: |
Static PE information: |
||
Source: |
Static PE information: |
Source: |
ReversingLabs: |
Source: |
Static PE information: |
Source: |
Key opened: |
Jump to behavior |
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |
Jump to behavior | ||
Source: |
Process created: |
Jump to behavior | ||
Source: |
Process created: |
Jump to behavior | ||
Source: |
Process created: |
Jump to behavior |
Source: |
File created: |
Jump to behavior |
Source: |
Classification label: |
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior |
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
||
Source: |
Base64 encoded string: |
Source: |
Mutant created: |
||
Source: |
Mutant created: |
Source: |
File opened: |
Jump to behavior |
Source: |
Static PE information: |
Source: |
Static PE information: |
Source: |
Binary string: |
||
Source: |
Binary string: |
Data Obfuscation |
|
---|
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
Source: |
Code function: |
0_2_00AA879F | |
Source: |
Code function: |
0_2_00AA3F9D | |
Source: |
Code function: |
0_2_00AA496C | |
Source: |
Code function: |
0_2_00AA9364 | |
Source: |
Code function: |
0_2_04FD4C8E | |
Source: |
Code function: |
0_2_04FDA7C6 | |
Source: |
Code function: |
0_2_04FDDD76 | |
Source: |
Code function: |
0_2_04FDA535 | |
Source: |
Code function: |
0_2_04FFF2E6 | |
Source: |
Code function: |
0_2_04FF505E | |
Source: |
Code function: |
0_2_04FF4FB6 | |
Source: |
Code function: |
6_2_00415209 | |
Source: |
Code function: |
6_2_00415209 | |
Source: |
Code function: |
6_2_004159C7 | |
Source: |
Code function: |
6_2_004155DF | |
Source: |
Code function: |
6_2_0041D617 | |
Source: |
Code function: |
6_2_0041BDF8 | |
Source: |
Code function: |
6_2_0041BE62 | |
Source: |
Code function: |
6_2_0041BDF8 | |
Source: |
Code function: |
6_2_0041BE62 | |
Source: |
Code function: |
6_2_00AA496C | |
Source: |
Code function: |
6_2_00AA9364 | |
Source: |
Code function: |
6_2_00AA879F | |
Source: |
Code function: |
6_2_00AA3F9D | |
Source: |
Code function: |
22_2_00983F9D | |
Source: |
Code function: |
22_2_0098879F | |
Source: |
Code function: |
22_2_0098496C | |
Source: |
Code function: |
22_2_00989364 | |
Source: |
Code function: |
22_2_02F1E7DE | |
Source: |
Code function: |
22_2_02F1E7DE | |
Source: |
Code function: |
22_2_0571AC7D |
Source: |
File created: |
Jump to dropped file |
Boot Survival |
|
---|
Source: |
Process created: |
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior |
Malware Analysis System Evasion |
|
---|
Source: |
RDTSC instruction interceptor: |
||
Source: |
RDTSC instruction interceptor: |
Source: |
Thread sleep count: |
Jump to behavior | ||
Source: |
Thread sleep time: |
Jump to behavior | ||
Source: |
Thread sleep time: |
Jump to behavior | ||
Source: |
Thread sleep count: |
Jump to behavior | ||
Source: |
Thread sleep time: |
Jump to behavior |
Source: |
Last function: |
||
Source: |
Last function: |
Source: |
Code function: |
6_2_00408D00 |
Source: |
Thread delayed: |
Jump to behavior |
Source: |
Process information queried: |
Jump to behavior |
Source: |
Thread delayed: |
Jump to behavior |
Anti Debugging |
|
---|
Source: |
Code function: |
22_2_02F1EE60 |
Source: |
Code function: |
6_2_00408D00 |
Source: |
Process token adjusted: |
Jump to behavior | ||
Source: |
Process token adjusted: |
Jump to behavior |
Source: |
Process queried: |
Jump to behavior | ||
Source: |
Process queried: |
Jump to behavior | ||
Source: |
Process queried: |
Jump to behavior |
Source: |
Memory allocated: |
Jump to behavior |
Source: |
Process created: |
Jump to behavior | ||
Source: |
Process created: |
Jump to behavior | ||
Source: |
Process created: |
Jump to behavior | ||
Source: |
Process created: |
Jump to behavior |
Source: |
Queries volume information: |
Jump to behavior | ||
Source: |
Queries volume information: |
Jump to behavior | ||
Source: |
Queries volume information: |
Jump to behavior | ||
Source: |
Queries volume information: |
Jump to behavior |
Source: |
Key value queried: |
Jump to behavior |
Stealing of Sensitive Information |
|
---|
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
Remote Access Functionality |
|
---|
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
|
low |