top title background image
flash

a.exe

Status: finished
Submission Time: 2020-06-30 12:49:10 +02:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

Details

  • Analysis ID:
    242256
  • API (Web) ID:
    380228
  • Analysis Started:
    2020-06-30 12:49:11 +02:00
  • Analysis Finished:
    2020-06-30 12:55:48 +02:00
  • MD5:
    bd1d7b1535c92ce9720ce25c226cd2cd
  • SHA1:
    b89378ab5549d843a2979cfb022f7a8a15592e78
  • SHA256:
    bbeee9ee22f5b24bc2d6b020912cd93349160596328aa1d8903b0e56374bd7f6
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 92
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 8/71

IPs

IP Country Detection
96.125.160.29
United States

Domains

Name IP Detection
mail.magicpharma.pt
96.125.160.29

URLs

Name Detection
https://OdkCLsZeefznAoeiIV.net
http://cps.letsencrypt.org0
http://cert.int-x3.letsencrypt.org/0
Click to see the 2 hidden entries
http://ocsp.int-x3.letsencrypt.org0/
http://cps.root-x1.letsencrypt.org0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\a.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\eoiylhvh.blw\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3024000
#
C:\Users\user\AppData\Roaming\eoiylhvh.blw\Firefox\Profiles\6c4zjj0s.default\cookies.sqlite
SQLite 3.x database, user version 9, last written using SQLite version 3023001
#