flash

https://www.mediafire.com/file/xuk5d6qwx9yx9bf/EXONE_2606202201.7z/file

Status: finished
Submission Time: 29.06.2020 12:51:29
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

Details

  • Analysis ID:
    241982
  • API (Web) ID:
    379686
  • Analysis Started:
    29.06.2020 12:51:30
  • Analysis Finished:
    29.06.2020 12:59:19
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
100/100

IPs

IP Country Detection
104.16.203.237
United States
77.88.21.158
Russian Federation
199.91.155.5
United States

Domains

Name IP Detection
www.mediafire.com
104.16.203.237
download2264.mediafire.com
199.91.155.5
smtp.yandex.ru
77.88.21.158
Click to see the 1 hidden entries
smtp.yandex.com
0.0.0.0

URLs

Name Detection
https://CJitfB1Uzswh2q.org
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
https://sectigo.com/CPS0
Click to see the 23 hidden entries
http://repository.certum.pl/ctnca.cer09
http://crl.certum.pl/ctnca.crl0k
http://yandex.crl.certum.pl/ycasha2.crl0q
https://www.mediafire.com
https://download2264.mediafire.com/emyw4xtvecig/xuk5d6qwx9yx9bf/EXONE
http://ocsp.sectigo.com
https://www.certum.pl/CPS0
http://ocsp.sectigo.com0)
http://ocsp.sectigo.comSk
https://www.mediafire.com/file/xuk5d6qwx9yx9bf/EXONE_2606202201.7z/fileID
http://smtp.yandex.com
http://yandex.ocsp-responder.com03
http://ocsp.sectigo.comED
http://subca.ocsp-certum.com0.
http://repository.certum.pl/ca.cer09
http://crls.yandex.net/certum/ycasha2.crl0-
https://www.mediafire.com/file/xuk5d6qwx9yx9bf/EXONE_2606202201.7z/file
http://subca.ocsp-certum.com01
http://crl.certum.pl/ca.crl0h
https://www.mediafire.com/file/xuk5d6qwx9yx9bf/EXONE_2606202201.7z/fileHD
http://www.certum.pl/CPS0
https://www.mediafire.com/file/xuk5d6qwx9yx9bf/EXONE_2606202201.7z/fileND
http://repository.certum.pl/ycasha2.cer0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\InstallUtil.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\amqrnpay.x1e\EXONE 2606202201.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EXONE 2606202201.exe.log
ASCII text, with CRLF line terminators
#
Click to see the 6 hidden entries
C:\Users\user\AppData\Local\Temp\4b2znvou.fsa\unarchiver.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\i31cac4t.2z4\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3024000
#
C:\Users\user\AppData\Roaming\i31cac4t.2z4\Firefox\Profiles\0i8ia8vs.default\cookies.sqlite
SQLite 3.x database, user version 9, last written using SQLite version 3024000
#
C:\Users\user\Desktop\cmdline.out
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\download\.wget-hsts
ASCII text, with CRLF line terminators
#
C:\Users\user\Desktop\download\EXONE 2606202201.7z
7-zip archive data, version 0.4
#