flash

11065-AMM0000557423-736065949.exe

Status: finished
Submission Time: 20.05.2020 10:28:36
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

Details

  • Analysis ID:
    231704
  • API (Web) ID:
    359699
  • Analysis Started:
    20.05.2020 10:28:37
  • Analysis Finished:
    20.05.2020 10:37:35
  • MD5:
    39b71dd0dc801e89e04f0d2b3824b55f
  • SHA1:
    5d3f749ab772af6552cc81d807c723e8181f5fe8
  • SHA256:
    e390ee24fef5920157d9c28af8d232cd542f30b193481fef6fffb007631f374b
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
100/100

malicious
17/71

malicious
15/48

IPs

IP Country Detection
46.4.95.247
Germany

Domains

Name IP Detection
elhelado.com.mx
46.4.95.247
mail.elhelado.com.mx
0.0.0.0

URLs

Name Detection
http://MOx5rIzSSpak0qLPtH.com
http://www.apache.org/licenses/LICENSE-2.0
http://www.founder.com.cn/cn/bThe
Click to see the 24 hidden entries
http://www.tiro.com
http://www.goodfont.co.kr
http://www.jiyu-kobo.co.jp/oi
http://www.jiyu-kobo.co.jp/jp/
http://www.sakkal.comx
http://www.carterandcone.coml
http://mail.elhelado.com.mx
http://www.sajatypeworks.com
http://www.typography.netD
http://www.founder.com.cn/cn/cThe
http://fontfabrik.com
http://www.founder.com.cn/cn
http://www.jiyu-kobo.co.jp/va
http://www.jiyu-kobo.co.jp/
http://www.jiyu-kobo.co.jp/Y0
http://elhelado.com.mx
http://www.fonts.com
http://www.sandoll.co.kr
http://www.jiyu-kobo.co.jp/#
http://www.jiyu-kobo.co.jp/d
http://www.zhongyicts.com.cn
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.sakkal.com
http://www.jiyu-kobo.co.jp/Y0/v

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\11065-AMM0000557423-736065949.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmpD283.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\RTJBQAXh.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 4 hidden entries
C:\Users\user\AppData\Roaming\RTJBQAXh.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\tt0fepcc.w1p.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Roaming\tt0fepcc.w1p\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3024000
#
C:\Users\user\AppData\Roaming\tt0fepcc.w1p\Firefox\Profiles\6c4zjj0s.default\cookies.sqlite
SQLite 3.x database, user version 9, last written using SQLite version 3023001
#