flash

a.exe

Status: finished
Submission Time: 30.06.2020 12:49:10
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

Details

  • Analysis ID:
    242256
  • API (Web) ID:
    380228
  • Analysis Started:
    30.06.2020 12:49:11
  • Analysis Finished:
    30.06.2020 12:55:48
  • MD5:
    bd1d7b1535c92ce9720ce25c226cd2cd
  • SHA1:
    b89378ab5549d843a2979cfb022f7a8a15592e78
  • SHA256:
    bbeee9ee22f5b24bc2d6b020912cd93349160596328aa1d8903b0e56374bd7f6
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113

malicious
92/100

malicious
8/71

IPs

IP Country Detection
96.125.160.29
United States

Domains

Name IP Detection
mail.magicpharma.pt
96.125.160.29

URLs

Name Detection
https://OdkCLsZeefznAoeiIV.net
http://cps.letsencrypt.org0
http://cert.int-x3.letsencrypt.org/0
Click to see the 2 hidden entries
http://ocsp.int-x3.letsencrypt.org0/
http://cps.root-x1.letsencrypt.org0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\a.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\eoiylhvh.blw\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3024000
#
C:\Users\user\AppData\Roaming\eoiylhvh.blw\Firefox\Profiles\6c4zjj0s.default\cookies.sqlite
SQLite 3.x database, user version 9, last written using SQLite version 3023001
#