top title background image
flash

SecuriteInfo.com.Trojan.PWS.Spy.21473.22818.exe

Status: finished
Submission Time: 2020-08-02 06:29:12 +02:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

Details

  • Analysis ID:
    255776
  • API (Web) ID:
    407090
  • Analysis Started:
    2020-08-02 06:29:15 +02:00
  • Analysis Finished:
    2020-08-02 06:41:56 +02:00
  • MD5:
    42fc3e5c8fae53cd62970eb83c25a00b
  • SHA1:
    b0a27c8bf5d1c4dd128dba9393442645431a144d
  • SHA256:
    d6ec5c176dc1ff21eb3204c10b6de79efaf73fa0dcdc7e7545d979a5d6eb503a
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 92
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
199.79.63.24
United States

Domains

Name IP Detection
bh-58.webhostbox.net
199.79.63.24

URLs

Name Detection
https://ENWpNd8d6QQqfvuo.org
http://www.play.net/playdotnet/simu_policy.aspMUnable
http://www.blacklightning.net
Click to see the 3 hidden entries
http://www.play.net/playdotnet/simu_policy.asp
http://www.blacklightning.netD
https://ENWpNd8d6QQqfvuo.org4)

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\nwama\nwama.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\nwama\nwama.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\SecuriteInfo.com.Trojan.PWS.Spy.21473.22818.exe.log
ASCII text, with CRLF line terminators
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\nwama.exe.log
ASCII text, with CRLF line terminators
#