top title background image
flash

PO.exe

Status: finished
Submission Time: 2020-08-11 16:22:36 +02:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • AgentTesla
  • exe

Details

  • Analysis ID:
    262017
  • API (Web) ID:
    419293
  • Analysis Started:
    2020-08-11 22:40:55 +02:00
  • Analysis Finished:
    2020-08-11 22:50:31 +02:00
  • MD5:
    812d38748f4efa596c56fd4c52462a14
  • SHA1:
    ab95c2b889d358fa7fc910b5aa4bd950556b114d
  • SHA256:
    616ab10592901307ae43cc24dd1387523a9f4998a7cef709354f304beadfb299
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
167.114.220.88
Canada

Domains

Name IP Detection
hybridgroupco.com
167.114.220.88
mail.hybridgroupco.com
0.0.0.0
asf-ris-prod-neurope.northeurope.cloudapp.azure.com
168.63.67.155

URLs

Name Detection
http://jLmXDJ1RYc5Tl5zT.net
https://raw.githubusercontent.com/MightyKingM/MathWizard/master/Notes.txt
http://www.jiyu-kobo.co.jp/jp/zr
Click to see the 63 hidden entries
http://www.fontbureau.comd
http://www.jiyu-kobo.co.jp/jp/
http://www.jiyu-kobo.co.jp/4qE
http://www.jiyu-kobo.co.jp/&qS
http://www.jiyu-kobo.co.jp/Vr
http://www.jiyu-kobo.co.jp/Y0/qr
http://ocsp.int-x3.letsencrypt.org0/
http://www.carterandcone.coml
http://www.jiyu-kobo.co.jp/R
http://cps.letsencrypt.org0
http://www.sajatypeworks.comt
http://www.fontbureau.com
http://www.apache.org/licenses/LICENSE-2.0
http://cps.root-x1.letsencrypt.org0
http://www.fontbureau.com/designers/cabarga.html
http://www.founder.com.cn/cn/1
http://www.jiyu-kobo.co.jp/d
http://www.fontbureau.comVr
http://www.fontbureau.com/designers/frere-jones.htmly
http://www.fontbureau.com/designers8
http://www.jiyu-kobo.co.jp/i
http://www.jiyu-kobo.co.jp/k
http://www.jiyu-kobo.co.jp/
http://www.fontbureau.com=
http://www.jiyu-kobo.co.jp/t
http://www.jiyu-kobo.co.jp/u
http://www.fontbureau.com/designers/frere-jones.html
http://www.founder.com.cn/cn
http://www.carterandcone.comypo(
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.galapagosdesign.com/staff/dennis.html#
http://www.sajatypeworks.com
http://www.sajatypeworks.comiv
https://raw.githubusercontent.com/MightyKingM/MathWizard/master/StartupText.txt
http://www.fontbureau.com/designers/?
http://jLmXDJ1RYc5Tl5zT.netHE
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers?
http://www.founder.com.cn/cnR
http://www.tiro.com
https://raw.githubusercontent.com/MightyKingM/MathWizard/master/About.txt
http://www.fontbureau.com/designers
http://www.tiro.com6/
http://www.goodfont.co.kr
http://www.carterandcone.com
http://www.jiyu-kobo.co.jp/jp/_r
http://www.founder.com.cn/cnE
http://www.fontbureau.com/designersG
http://www.typography.netD
http://www.founder.com.cn/cn/cThe
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
http://www.carterandcone.comC
http://cert.int-x3.letsencrypt.org/0
http://www.jiyu-kobo.co.jp/_r
http://www.galapagosdesign.com/DPlease
http://www.jiyu-kobo.co.jp/Y0
http://www.fonts.com
http://www.jiyu-kobo.co.jp/jp/R
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://www.sakkal.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\PO.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp1F56.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\iFKjqQXcK.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Roaming\iFKjqQXcK.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#