flash

Ordine n.47201 pdf.vbs

Status: finished
Submission Time: 2022-11-28 14:49:13 +01:00
Malicious
Trojan
Spyware
Exploiter
Evader
AgentTesla, GuLoader

Comments

Tags

  • agenttesla
  • vbs

Details

  • Analysis ID:
    755275
  • API (Web) ID:
    1122551
  • Analysis Started:
    2022-11-28 14:49:15 +01:00
  • Analysis Finished:
    2022-11-28 15:02:13 +01:00
  • MD5:
    c8290bc8659c4a6a45ccd1af9268e400
  • SHA1:
    d2a97dd4fa44d5e2a568d75b764cc47e5878f960
  • SHA256:
    f39968efba7ebe58abba685f5b834f6e0c8393dfaeaf7d08d5f6e625c33a04e1
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
9/91

IPs

IP Country Detection
185.31.121.136
Bulgaria
162.240.62.179
United States
52.20.78.240
United States

Domains

Name IP Detection
ftp.mcmprint.net
185.31.121.136
api.ipify.org.herokudns.com
52.20.78.240
qwedft.gq
162.240.62.179
Click to see the 1 hidden entries
api.ipify.org
0.0.0.0

URLs

Name Detection
https://api.ipify.org/
http://qwedft.gq/Akkant/bwqPIdZhEA125.psm

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\i3ontxzb\i3ontxzb.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (374), with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Temp\RESEEA4.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Mon Nov 28 22:51:21 2022, 1st section name ".debug$S"
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ajtz5gna.zoe.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cooiigyo.4mo.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\i3ontxzb\CSC7271579FEF14719AB8809EB2A5F450.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\i3ontxzb\i3ontxzb.0.cs
Unicode text, UTF-8 (with BOM) text, with very long lines (1160), with no line terminators
#
C:\Users\user\AppData\Local\Temp\i3ontxzb\i3ontxzb.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\i3ontxzb\i3ontxzb.out
Unicode text, UTF-8 (with BOM) text, with very long lines (451), with CRLF, CR line terminators
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#