top title background image
flash

iEhBDrw6oW.exe

Status: finished
Submission Time: 2020-05-20 22:28:44 +02:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

Details

  • Analysis ID:
    231947
  • API (Web) ID:
    360164
  • Analysis Started:
    2020-05-20 22:35:24 +02:00
  • Analysis Finished:
    2020-05-20 22:49:34 +02:00
  • MD5:
    bd2aeaab8f491a77f7c7ce59b027cf2c
  • SHA1:
    2a790244357f24b6145a43d35a3644728250e2dc
  • SHA256:
    5b37cc85fd190a6b4726ea57f2588b5a74acc2c51e2917363c226b73ac79118f
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 54/72
malicious
Score: 9/38
malicious
Score: 26/31

IPs

IP Country Detection
198.54.120.244
United States

Domains

Name IP Detection
twire.icu
198.54.120.244

URLs

Name Detection
https://bQhrnZX76uilMKih6M.com
https://www.pelock.com/api/aztec-decoder/v1
http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe
Click to see the 1 hidden entries
http://twire.icu

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\iEhBDrw6oW.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\appdata.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\appdata.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\appdata.exe.log
ASCII text, with CRLF line terminators
#