flash

MACHINE SPECIFICATIONS.exe

Status: finished
Submission Time: 2022-11-29 11:18:06 +01:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • exe

Details

  • Analysis ID:
    755960
  • API (Web) ID:
    1123236
  • Analysis Started:
    2022-11-29 11:18:06 +01:00
  • Analysis Finished:
    2022-11-29 11:28:33 +01:00
  • MD5:
    92945d0a2731ef771ea9d10c792e03e1
  • SHA1:
    1eeef600b7b51ce7aa93e825be55b40f3ef8e319
  • SHA256:
    46b61250c34b38d26ac5897217e6b70a222ff16318161c4e67c74c74491cc612
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
40/68

malicious
19/26

malicious

IPs

IP Country Detection
51.195.62.160
France
3.220.57.224
United States

Domains

Name IP Detection
ftp.electrobist.com
51.195.62.160
api.ipify.org.herokudns.com
3.220.57.224
c-0001.c-msedge.net
13.107.4.50
Click to see the 1 hidden entries
api.ipify.org
0.0.0.0

URLs

Name Detection
https://api.ipify.org/
http://127.0.0.1:HTTP/1.1
https://api.ipify.org
Click to see the 7 hidden entries
https://eyUBHCqVhczCNfHAY6U.org
http://xgrPBN.com
http://ftp.electrobist.com
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://api.ipify.orgftp://ftp.electrobist.comuser1
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
http://DynDns.comDynDNSnamejidpasswordPsi/Psi

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MACHINE SPECIFICATIONS.exe.log
CSV text
#
C:\Users\user\AppData\Roaming\newapp\newapp.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\newapp.exe.log
ASCII text, with CRLF line terminators
#
Click to see the 1 hidden entries
\Device\ConDrv
ASCII text, with CRLF line terminators
#