top title background image
flash

Money gram.exe

Status: finished
Submission Time: 2020-10-18 08:40:17 +02:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • AgentTesla
  • exe
  • FRA
  • geo
  • Outlook

Details

  • Analysis ID:
    299747
  • API (Web) ID:
    494594
  • Analysis Started:
    2020-10-18 08:40:45 +02:00
  • Analysis Finished:
    2020-10-18 08:55:10 +02:00
  • MD5:
    b0cff698d1fd64ef9a159e2dbea1abaf
  • SHA1:
    44645a78e2dbe6dbd0e23c60204cb28dc4c4136b
  • SHA256:
    3027bef9e4262ad05caadb38d130aeaed53ba3df25e3987b76f4d57a286f733b
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 99
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 5/38
malicious
Score: 5/48

IPs

IP Country Detection
173.194.69.109
United States
173.194.69.108
United States

Domains

Name IP Detection
smtp.gmail.com
173.194.69.109

URLs

Name Detection
https://sEtTHYPtXbx3I.org
http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Sl
http://pki.goog/gsr2/GTS1O1.crt0
Click to see the 9 hidden entries
http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe
http://crl.micro
http://crl.pki.goog/gsr2/gsr2.crl0?
http://ocsp.pki.goog/gsr202
https://pki.goog/repository/0
http://ocsp.pki.goog/gts1o1core0
http://crl.pki.
http://smtp.gmail.com
http://crl.pki.goog/GTS1O1core.crl0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Money gram.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\application.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\fCvYpQH\ljYBX.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\application.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ljYBX.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\43ulclkt.rcz.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Roaming\43ulclkt.rcz\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\heayz2a4.xbc.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Roaming\heayz2a4.xbc\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\pj3ywz5o.bb0.zip
Zip archive data, at least v2.0 to extract
#
C:\Users\user\AppData\Roaming\pj3ywz5o.bb0\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3032001
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#