540b64d8...467b | Network
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification:
Spyware
Keylogger
Exploit
...
Threat Names:
Exploit.RTF-ObfsStrm.Gen
Gen:Variant.Graftor.807433
VBS.Heur.Laburrak.7.Gen
...

tmpeml_attach_for_scan8939506995a312b8dcb233913095b87d.file.rtf

RTF Document

Created at 2020-08-04T23:24:00

Remarks (2/2)

(0x0200000E): The overall sleep time of all monitored processes was truncated from "2 hours, 8 minutes, 9 seconds" to "1 minute, 20 seconds" to reveal dormant functionality.

(0x02000004): The operating system was rebooted during the analysis because the sample installed a startup script, task or application for persistence.

General

Total Sent: 73.63 KB
Total Received: 956.78 KB
2 ports: 80 , 587
5 contacted IP addresses
0 URLs extracted
2 files downloaded
1 malicious hosts detected

DNS

6 DNS requests for 3 domains
1 nameserver contacted
0 total requests returned errors

HTTP/S

2 URLs contacted, 2 servers
3 sessions, sending 12.55 KB, receiving 948.34 KB
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image