Try VMRay Platform
Malicious
Classifications

Spyware Exploit Downloader

Threat Names

Lokibot Mal/HTMLGen-A Trojan.GenericKDZ.77897 Trojan.GenericKDZ.77711 +3

Dynamic Analysis Report

Created on 2021-09-28T05:23:00

09d2b8f86f136cb14832e9a4de582c239c698044adcc8d12d6195f5eff78ccab.xlsx

Excel Document

Remarks (1/1)

(0x0200000E): The overall sleep time of all monitored processes was truncated from "3 hours, 31 minutes" to "20 seconds" to reveal dormant functionality.

Remarks

(0x0200001D): The maximum number of extracted files was exceeded. Some files may be missing in the report.

(0x0200004F): Static Analysis failed to analyze file artifacts in this analysis due to an error. Check the artifact_static_analysis.log file for further information.

Filters:
File Name Category Type Verdict Actions
C:\Users\RDhJ0CNFevzX\Desktop\09d2b8f86f136cb14832e9a4de582c239c698044adcc8d12d6195f5eff78ccab.xlsx Sample File Excel Document
malicious
»
MIME Type application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
File Size 410.62 KB
MD5 27eb25e6fbbbd37115055ecc4b557c53 Copy to Clipboard
SHA1 4c986607a941900d9d8804aa351dcab0cc4de224 Copy to Clipboard
SHA256 09d2b8f86f136cb14832e9a4de582c239c698044adcc8d12d6195f5eff78ccab Copy to Clipboard
SSDeep 6144:fQOdpdVnGAWCDj4TvvuX2sNNtN+Por6ouj38cawe5kA0t8+yWENL/XfOmPKI:4O7cvCbNtUzP3jmiA06+l6Xf5 Copy to Clipboard
ImpHash -
File Reputation Information
»
Verdict
malicious
AV Matches (1)
»
Threat Name Verdict
Trojan.GenericKDZ.77897
malicious
Office Information
»
Create Time 2006-09-16 00:00:00+00:00
Modify Time 2021-09-27 14:06:21+00:00
Detected CVEs CVE-2018-0798
Application Microsoft Excel
App Version 12.0000
Document Security SECURITY_PASSWORD
Titles Of Parts Sheet1, Sheet2, Sheet3
ScaleCrop False
SharedDoc False
Controls (1)
»
CLSID Control Name Associated Vulnerability
{0002CE02-0000-0000-C000-000000000046} Equation2 CVE-2017-11882
Extracted Image Texts (2)
»
Image 1: image1.png
»
er eee HR e bere seater is SR
Image 2: image3.png
»
Meme of Element Hesent 10) We de Weeden de oo
Microsoft_Office_Word_Macro-Enabled_Document1.docm Embedded File Word Document
malicious
»
Parent File C:\Users\RDhJ0CNFevzX\Desktop\09d2b8f86f136cb14832e9a4de582c239c698044adcc8d12d6195f5eff78ccab.xlsx
MIME Type application/vnd.openxmlformats-officedocument.wordprocessingml.document
File Size 119.64 KB
MD5 dc8ef54a8a9d5741625519f7d846208b Copy to Clipboard
SHA1 9eba1afa49691c9fdab454e862cf8d5dde1c48b2 Copy to Clipboard
SHA256 f7e996e828efa2b523a90c99418b95925429ecfd364adc06c7a74250417e8049 Copy to Clipboard
SSDeep 1536:ShKB3n4BDUYcx5EmIMO3OJkdUPP3Xs/k9WNWQWL0JOqFB5egbQCRTylUh/muwSMA:SW34UL0tS6WB0JOqFB5LEA7rgXuzqhu Copy to Clipboard
ImpHash -
AV Matches (1)
»
Threat Name Verdict
Trojan.GenericKDZ.77711
malicious
Office Information
»
Creator 91974
Last Modified By 91974
Revision 1
Create Time 2021-09-27 14:05:00+00:00
Modify Time 2021-09-27 14:05:00+00:00
Application Microsoft Office Word
App Version 12.0000
Template Normal.dotm
Document Security NONE
Editing Time 1.0
Page Count 1
Line Count 1
Paragraph Count 1
Character Count 1
Chars With Spaces 1
ScaleCrop False
SharedDoc False
Extracted Image Texts (1)
»
Image 1: image1.png
»
[ 1] °) Microsoft® 1. Open the document in Microsoft Office e Previewing online is not available for protected j wd | ce documents . 2. If this document was downloaded from your email, please click Enable Editing from the . "i yellow bar above This document is = protected 3. Once you have enabled editing, please click Update Links
image1.png Embedded File Image
malicious
»
Parent File Microsoft_Office_Word_Macro-Enabled_Document1.docm
MIME Type image/png
File Size 109.05 KB
MD5 8a9e82ca90ff220636c43d6999731863 Copy to Clipboard
SHA1 40a3c6faaf3cbc6eb007239e536ca2df77ebbcbc Copy to Clipboard
SHA256 712f31161e652892b476b13e5671a4fb895d1c37c7d8651429c4efeb62f7639d Copy to Clipboard
SSDeep 1536:8B3n4BDUYcx5EmIMO3OJkdUPP3Xs/k9WNWQWL0JOqFB5egbQCRTylUh/muwSMXuh:K34UL0tS6WB0JOqFB5LEA7rgXuzqy Copy to Clipboard
ImpHash -
File Reputation Information
»
Verdict
malicious
oleObject1.bin Embedded File OLE Compound
malicious
»
Parent File C:\Users\RDhJ0CNFevzX\Desktop\09d2b8f86f136cb14832e9a4de582c239c698044adcc8d12d6195f5eff78ccab.xlsx
MIME Type application/CDFV2
File Size 4.00 KB
MD5 d74c077cb2fe916359bbee63c885f5f0 Copy to Clipboard
SHA1 db5f8324648f5092c8d1931004debb662ff1e1c1 Copy to Clipboard
SHA256 8bc788fe8527f2818c0d2a2c583d6b06d9a991eb0eee26661631b10eeff2ccde Copy to Clipboard
SSDeep 48:r2A/SXGL/uIdQSFhcTGkoIWSKN00ckORv:uXGLmIdx+GkTVe Copy to Clipboard
ImpHash -
Parser Error Remark Static engine was unable to completely parse the analyzed file
AV Matches (1)
»
Threat Name Verdict
Exploit.CVE-2018-0802.Gen
malicious
Office Information
»
Controls (1)
»
CLSID Control Name Associated Vulnerability
{0002CE02-0000-0000-C000-000000000046} Equation2 CVE-2017-11882
CFB Streams (2)
»
Name ID Size Actions
Root\Ole 1 20 Bytes
Root\olE10NAtiVe 2 1.64 KB
C:\Users\RDhJ0CNFevzX\AppData\Roaming\9EDDE9\9BDC8A.exe Dropped File Unknown
N/A
Not Available because the file was not extracted successfully.
»
Also Known As C:\Users\Public\vbc.exe (Dropped File)
MIME Type -
File Size -
MD5 -
SHA1 -
SHA256 -
SSDeep -
ImpHash -
c:\users\rdhj0cnfevzx\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-1560258661-3990802383-1811730007-1000\3d3578a85286f88c6cd9d151e4412949_03845cb8-7441-4a2f-8c0f-c90408af5778 Dropped File Stream
clean
»
MIME Type application/octet-stream
File Size 53 Bytes
MD5 9c3c1a69a3c43835d6a2579570e6aa0d Copy to Clipboard
SHA1 8af2c3b90473b35f1bb936de12a8bf72fe658468 Copy to Clipboard
SHA256 e641ff8107a4197ded9f558d1891e716811e9a7f109f14e876f5a8394844dc34 Copy to Clipboard
SSDeep 3:/l4l5mrc9l:e4rc9l Copy to Clipboard
ImpHash -
C:\Users\RDhJ0CNFevzX\AppData\Roaming\9EDDE9\9BDC8A.hdb Dropped File Text
clean
»
MIME Type text/plain
File Size 4 Bytes
MD5 90f2527e58191a885a8cc35c99b89ba8 Copy to Clipboard
SHA1 10455ce0eb31eead75481e75dcba232d28c7e4c7 Copy to Clipboard
SHA256 859ffdca62ee0971821a4b2dedfc023d0f9a021391b5ac336ddb49d53d28330e Copy to Clipboard
SSDeep 3:Kn:Kn Copy to Clipboard
ImpHash -
C:\Users\RDhJ0CNFevzX\AppData\Roaming\9EDDE9\9BDC8A.lck Dropped File Stream
clean
Known to be clean.
»
MIME Type application/octet-stream
File Size 1 Bytes
MD5 c4ca4238a0b923820dcc509a6f75849b Copy to Clipboard
SHA1 356a192b7913b04c54574d18c28d46e6395428ab Copy to Clipboard
SHA256 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b Copy to Clipboard
SSDeep 3:U:U Copy to Clipboard
ImpHash -
c:\users\rdhj0cnfevzx\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-1560258661-3990802383-1811730007-1000\3d3578a85286f88c6cd9d151e4412949_03845cb8-7441-4a2f-8c0f-c90408af5778 Dropped File Stream
clean
Known to be clean.
»
MIME Type application/octet-stream
File Size 53 Bytes
MD5 eca0470178275ac94e5de381969ed232 Copy to Clipboard
SHA1 d6de27e734eec57d1dda73489b4a6d6eecae3038 Copy to Clipboard
SHA256 353fd628b7f6e7d426e5d6a27d1bc3ac22fa7f812e7594cf2ec5ca1175785b50 Copy to Clipboard
SSDeep 3:: Copy to Clipboard
ImpHash -
e4c1c0121487f83b014b8c81bbaf03db0b7f49584a268a5e67ca64ba6e64676f Downloaded File Binary
clean
»
Parent File analysis.pcap
MIME Type application/vnd.microsoft.portable-executable
File Size 205.50 KB
MD5 59a67b5ccf01b6a564265797dc5e53e8 Copy to Clipboard
SHA1 996281d368fcc2cefe5bf99399ccb19299c6f8ff Copy to Clipboard
SHA256 e4c1c0121487f83b014b8c81bbaf03db0b7f49584a268a5e67ca64ba6e64676f Copy to Clipboard
SSDeep 3072:2v+ArX9FLxOhanZBsX3PovEuKwEXLqfP6GB6klGfLIQVNWBz:6+KnIanZyHPoqqfSGB6k8Txql Copy to Clipboard
ImpHash 006a79ea8a61231651632116bf97f2d7 Copy to Clipboard
PE Information
»
Image Base 0x400000
Entry Point 0x401b18
Size Of Code 0x16c00
Size Of Initialized Data 0xa1400
File Type FileType.executable
Subsystem Subsystem.windows_gui
Machine Type MachineType.i386
Compile Timestamp 2021-01-30 19:58:00+00:00
Version Information (3)
»
InternalName sajbmiamezu.ise
Copyright Copyrighz (C) 2021, fudkagat
ProductVersion 8.64.59.5
Sections (4)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x401000 0x16a20 0x16c00 0x400 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 7.74
.rdata 0x418000 0x31ef 0x3200 0x17000 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 4.18
.data 0x41c000 0x8557c 0x1e00 0x1a200 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE 1.32
.rsrc 0x4a2000 0x175b8 0x17600 0x1c000 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 6.36
Imports (2)
»
KERNEL32.dll (92)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
GetCommandLineW - 0x418000 0x1a968 0x19968 0x170
HeapReAlloc - 0x418004 0x1a96c 0x1996c 0x2a4
GetLocaleInfoA - 0x418008 0x1a970 0x19970 0x1e8
LoadResource - 0x41800c 0x1a974 0x19974 0x2f6
InterlockedDecrement - 0x418010 0x1a978 0x19978 0x2bc
GetEnvironmentStringsW - 0x418014 0x1a97c 0x1997c 0x1c1
AddConsoleAliasW - 0x418018 0x1a980 0x19980 0x6
SetEvent - 0x41801c 0x1a984 0x19984 0x3d3
OpenSemaphoreA - 0x418020 0x1a988 0x19988 0x335
GetSystemTimeAsFileTime - 0x418024 0x1a98c 0x1998c 0x24f
WriteFileGather - 0x418028 0x1a990 0x19990 0x48f
CreateActCtxW - 0x41802c 0x1a994 0x19994 0x68
GetEnvironmentStrings - 0x418030 0x1a998 0x19998 0x1bf
LeaveCriticalSection - 0x418034 0x1a99c 0x1999c 0x2ef
GetFileAttributesA - 0x418038 0x1a9a0 0x199a0 0x1c9
FindNextVolumeW - 0x41803c 0x1a9a4 0x199a4 0x135
GetDevicePowerState - 0x418040 0x1a9a8 0x199a8 0x1b3
GetProcAddress - 0x418044 0x1a9ac 0x199ac 0x220
FreeUserPhysicalPages - 0x418048 0x1a9b0 0x199b0 0x150
VerLanguageNameW - 0x41804c 0x1a9b4 0x199b4 0x44e
WriteConsoleA - 0x418050 0x1a9b8 0x199b8 0x482
GetProcessId - 0x418054 0x1a9bc 0x199bc 0x225
LocalAlloc - 0x418058 0x1a9c0 0x199c0 0x2f9
RemoveDirectoryW - 0x41805c 0x1a9c4 0x199c4 0x380
WaitForMultipleObjects - 0x418060 0x1a9c8 0x199c8 0x462
EnumResourceTypesW - 0x418064 0x1a9cc 0x199cc 0xf1
GetModuleFileNameA - 0x418068 0x1a9d0 0x199d0 0x1f4
GetModuleHandleA - 0x41806c 0x1a9d4 0x199d4 0x1f6
EraseTape - 0x418070 0x1a9d8 0x199d8 0x102
GetStringTypeW - 0x418074 0x1a9dc 0x199dc 0x240
ReleaseMutex - 0x418078 0x1a9e0 0x199e0 0x377
EndUpdateResourceA - 0x41807c 0x1a9e4 0x199e4 0xd7
LocalSize - 0x418080 0x1a9e8 0x199e8 0x302
FindFirstVolumeW - 0x418084 0x1a9ec 0x199ec 0x12a
FindNextVolumeA - 0x418088 0x1a9f0 0x199f0 0x132
lstrcpyW - 0x41808c 0x1a9f4 0x199f4 0x4b0
HeapAlloc - 0x418090 0x1a9f8 0x199f8 0x29d
GetCommandLineA - 0x418094 0x1a9fc 0x199fc 0x16f
GetStartupInfoA - 0x418098 0x1aa00 0x19a00 0x239
DeleteCriticalSection - 0x41809c 0x1aa04 0x19a04 0xbe
EnterCriticalSection - 0x4180a0 0x1aa08 0x19a08 0xd9
HeapFree - 0x4180a4 0x1aa0c 0x19a0c 0x2a1
VirtualFree - 0x4180a8 0x1aa10 0x19a10 0x457
VirtualAlloc - 0x4180ac 0x1aa14 0x19a14 0x454
HeapCreate - 0x4180b0 0x1aa18 0x19a18 0x29f
GetModuleHandleW - 0x4180b4 0x1aa1c 0x19a1c 0x1f9
Sleep - 0x4180b8 0x1aa20 0x19a20 0x421
ExitProcess - 0x4180bc 0x1aa24 0x19a24 0x104
WriteFile - 0x4180c0 0x1aa28 0x19a28 0x48d
GetStdHandle - 0x4180c4 0x1aa2c 0x19a2c 0x23b
SetHandleCount - 0x4180c8 0x1aa30 0x19a30 0x3e8
GetFileType - 0x4180cc 0x1aa34 0x19a34 0x1d7
GetLastError - 0x4180d0 0x1aa38 0x19a38 0x1e6
SetFilePointer - 0x4180d4 0x1aa3c 0x19a3c 0x3df
TerminateProcess - 0x4180d8 0x1aa40 0x19a40 0x42d
GetCurrentProcess - 0x4180dc 0x1aa44 0x19a44 0x1a9
UnhandledExceptionFilter - 0x4180e0 0x1aa48 0x19a48 0x43e
SetUnhandledExceptionFilter - 0x4180e4 0x1aa4c 0x19a4c 0x415
IsDebuggerPresent - 0x4180e8 0x1aa50 0x19a50 0x2d1
FreeEnvironmentStringsA - 0x4180ec 0x1aa54 0x19a54 0x14a
FreeEnvironmentStringsW - 0x4180f0 0x1aa58 0x19a58 0x14b
WideCharToMultiByte - 0x4180f4 0x1aa5c 0x19a5c 0x47a
TlsGetValue - 0x4180f8 0x1aa60 0x19a60 0x434
TlsAlloc - 0x4180fc 0x1aa64 0x19a64 0x432
TlsSetValue - 0x418100 0x1aa68 0x19a68 0x435
TlsFree - 0x418104 0x1aa6c 0x19a6c 0x433
InterlockedIncrement - 0x418108 0x1aa70 0x19a70 0x2c0
SetLastError - 0x41810c 0x1aa74 0x19a74 0x3ec
GetCurrentThreadId - 0x418110 0x1aa78 0x19a78 0x1ad
QueryPerformanceCounter - 0x418114 0x1aa7c 0x19a7c 0x354
GetTickCount - 0x418118 0x1aa80 0x19a80 0x266
GetCurrentProcessId - 0x41811c 0x1aa84 0x19a84 0x1aa
InitializeCriticalSectionAndSpinCount - 0x418120 0x1aa88 0x19a88 0x2b5
RtlUnwind - 0x418124 0x1aa8c 0x19a8c 0x392
LoadLibraryA - 0x418128 0x1aa90 0x19a90 0x2f1
SetStdHandle - 0x41812c 0x1aa94 0x19a94 0x3fc
GetConsoleCP - 0x418130 0x1aa98 0x19a98 0x183
GetConsoleMode - 0x418134 0x1aa9c 0x19a9c 0x195
FlushFileBuffers - 0x418138 0x1aaa0 0x19aa0 0x141
GetCPInfo - 0x41813c 0x1aaa4 0x19aa4 0x15b
GetACP - 0x418140 0x1aaa8 0x19aa8 0x152
GetOEMCP - 0x418144 0x1aaac 0x19aac 0x213
IsValidCodePage - 0x418148 0x1aab0 0x19ab0 0x2db
HeapSize - 0x41814c 0x1aab4 0x19ab4 0x2a6
GetConsoleOutputCP - 0x418150 0x1aab8 0x19ab8 0x199
WriteConsoleW - 0x418154 0x1aabc 0x19abc 0x48c
MultiByteToWideChar - 0x418158 0x1aac0 0x19ac0 0x31a
LCMapStringA - 0x41815c 0x1aac4 0x19ac4 0x2e1
LCMapStringW - 0x418160 0x1aac8 0x19ac8 0x2e3
GetStringTypeA - 0x418164 0x1aacc 0x19acc 0x23d
CloseHandle - 0x418168 0x1aad0 0x19ad0 0x43
CreateFileA - 0x41816c 0x1aad4 0x19ad4 0x78
USER32.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
GetCursorPos - 0x418174 0x1aadc 0x19adc 0x119
Exports (1)
»
Api name EAT Address Ordinal
@SetViceVariants@12 0x1000 0x1
80aad0ae2fec7897caf8648c99b16b6da20871feb05958cdd324b9f9c6c88b44 Downloaded File Stream
clean
»
Parent File analysis.pcap
MIME Type application/octet-stream
File Size 288 Bytes
MD5 9dbd535925a464f6aa225d710781f9a0 Copy to Clipboard
SHA1 189384f4637e39b697a03cb2bf4030191a00ba9c Copy to Clipboard
SHA256 80aad0ae2fec7897caf8648c99b16b6da20871feb05958cdd324b9f9c6c88b44 Copy to Clipboard
SSDeep 6:v0OYlHyNUMDccxcVEsElOC4KjQg3Zenk6KKinHVRYx5f0RdWKsDTxzJfd6BUFxRV:v0llHyK4cQcVEn/4K0g3ZencK0j2ZtTl Copy to Clipboard
ImpHash -
4ba75cecc974b157ac6734d2f6a925a30ac61760d60f326441bac30c95aceef4 Downloaded File Stream
clean
»
Parent File analysis.pcap
MIME Type application/octet-stream
File Size 186 Bytes
MD5 15df4ac927d5fe4424e54e8652326a3e Copy to Clipboard
SHA1 63f5c27099dd27485ca6b84a7395e8f37f88b273 Copy to Clipboard
SHA256 4ba75cecc974b157ac6734d2f6a925a30ac61760d60f326441bac30c95aceef4 Copy to Clipboard
SSDeep 3:v0OEhlHyflUMDcPkxcPFv/ssleljL+l/llMljQg3Zenk6KKiDgdtNll/n:v0OYlHyNUMDccxcVEsElqkjQg3Zenk6P Copy to Clipboard
ImpHash -
9811b34e5885a16e5001187e9065a0886c709e028e2eff8a485374dcaf0bc6ed Downloaded File Stream
clean
»
Parent File analysis.pcap
MIME Type application/octet-stream
File Size 159 Bytes
MD5 f39c402c8a655af4b3ccacce62ed55b1 Copy to Clipboard
SHA1 a1ac49374b5c4f33fd7275dee85c0a021216edf6 Copy to Clipboard
SHA256 9811b34e5885a16e5001187e9065a0886c709e028e2eff8a485374dcaf0bc6ed Copy to Clipboard
SSDeep 3:wOOEhlHyflUMDcPkxcPFv/sslell+ldljQg3Zenk6KKiDn:wOOYlHyNUMDccxcVEsElsljQg3Zenk60 Copy to Clipboard
ImpHash -
c64510503435c2143bad854faba7891308b4b089d140449ceb903620fea45d6a Downloaded File Stream
clean
»
Parent File analysis.pcap
MIME Type application/octet-stream
File Size 23 Bytes
MD5 f74f0c674b6a20bbb1a7afac774bcfde Copy to Clipboard
SHA1 07a2ca2822e69fcd2a70c73cc83dd553b8b97235 Copy to Clipboard
SHA256 c64510503435c2143bad854faba7891308b4b089d140449ceb903620fea45d6a Copy to Clipboard
SSDeep 3:1lMgne9n:Ewe9n Copy to Clipboard
ImpHash -
0ac261a3dd7e4e01964f219403d88223318e7b3fa6ccbb196bf2cd9da56151f7 Embedded File Stream
clean
»
Parent File C:\Users\RDhJ0CNFevzX\Desktop\09d2b8f86f136cb14832e9a4de582c239c698044adcc8d12d6195f5eff78ccab.xlsx
MIME Type application/octet-stream
File Size 1.64 KB
MD5 33a40c92485453285ac10c632a74583c Copy to Clipboard
SHA1 cac080435a933016f3ef5f032716512ad7743010 Copy to Clipboard
SHA256 0ac261a3dd7e4e01964f219403d88223318e7b3fa6ccbb196bf2cd9da56151f7 Copy to Clipboard
SSDeep 24:2A9Xj4LFnL/uIdQZOrFV7cTG2boI2BSTiPaClLQXmyiHv0APlO5gZt0NpRvs:2SXGL/uIdQSFhcTGkoIWSKN00ckORvs Copy to Clipboard
ImpHash -
image1.png Embedded File Image
clean
»
Parent File C:\Users\RDhJ0CNFevzX\Desktop\09d2b8f86f136cb14832e9a4de582c239c698044adcc8d12d6195f5eff78ccab.xlsx
MIME Type image/png
File Size 63.53 KB
MD5 22335141d285e599cdaef99eaba59d5b Copy to Clipboard
SHA1 c8e5f6f30e91f2c55d96867caa2d1e21e7a4804d Copy to Clipboard
SHA256 6c0757667f548698b721e4d723768447046b509c1777d6f1474bde45649d92b0 Copy to Clipboard
SSDeep 1536:LT3dRSPKeePekFnfpQ6uF2sxiPfqu2RjWn0ZqNnbMXrpLlx6q1F:fdoPI79fpQXtjupn7Nnb8pLll Copy to Clipboard
ImpHash -
image2.jpeg Embedded File Image
clean
»
Parent File C:\Users\RDhJ0CNFevzX\Desktop\09d2b8f86f136cb14832e9a4de582c239c698044adcc8d12d6195f5eff78ccab.xlsx
MIME Type image/jpeg
File Size 13.87 KB
MD5 e8fc908d33c78aaad1d06e865fc9f9b0 Copy to Clipboard
SHA1 72ca86d260330fc32246d28349c07933e427065d Copy to Clipboard
SHA256 7bb11564f3c6c559b3ac8ade3e5fca1d51f5451aff5c522d70c3bacec0bbb5d0 Copy to Clipboard
SSDeep 384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S Copy to Clipboard
ImpHash -
image3.png Embedded File Image
clean
»
Parent File C:\Users\RDhJ0CNFevzX\Desktop\09d2b8f86f136cb14832e9a4de582c239c698044adcc8d12d6195f5eff78ccab.xlsx
MIME Type image/png
File Size 33.00 KB
MD5 613c306c3cc7c3367595d71beecd5de4 Copy to Clipboard
SHA1 cb5e280a2b1f4f1650040842bacc9d3df916275e Copy to Clipboard
SHA256 a76d01a33a00e98acd33bee9fbe342479ebda9438c922fe264dc0f1847134294 Copy to Clipboard
SSDeep 768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw Copy to Clipboard
ImpHash -
image4.jpeg Embedded File Image
clean
»
Parent File C:\Users\RDhJ0CNFevzX\Desktop\09d2b8f86f136cb14832e9a4de582c239c698044adcc8d12d6195f5eff78ccab.xlsx
MIME Type image/jpeg
File Size 8.61 KB
MD5 f06432656347b7042c803fe58f4043e1 Copy to Clipboard
SHA1 4bd52b10b24eadeca4b227969170c1d06626a639 Copy to Clipboard
SHA256 409f06fc20f252c724072a88626cb29f299167eae6655d81df8e9084e62d6cf6 Copy to Clipboard
SSDeep 192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW Copy to Clipboard
ImpHash -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image