flash

DHL document.exe

Status: finished
Submission Time: 13.01.2021 09:46:45
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • AgentTesla
  • DHL
  • exe

Details

  • Analysis ID:
    339038
  • API (Web) ID:
    579988
  • Analysis Started:
    13.01.2021 09:48:17
  • Analysis Finished:
    13.01.2021 09:57:23
  • MD5:
    5c629d2ad3a45250eebc832c568e9ad0
  • SHA1:
    8b32e938bcd05fb40ec673607a4748b4badbd614
  • SHA256:
    566554b534a53102dd67fc20bd07ca49241b51616d73619e383e80bdfc4fe08a
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious
New

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
27/70

malicious
10/44

IPs

IP Country Detection
194.33.40.40
Moldova Republic of

Domains

Name IP Detection
dicon.md
194.33.40.40
mail.dicon.md
0.0.0.0

URLs

Name Detection
https://B2bQlilPZYn20R.org
http://127.0.0.1:HTTP/1.1
http://www.fontbureau.com/designersG
Click to see the 51 hidden entries
http://www.fontbureau.com/designers/?
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers?
http://www.jiyu-kobo.co.jp/a-d
http://www.tiro.com
http://www.fontbureau.com/designers
http://www.goodfont.co.kr
http://stPqVp.com
http://www.jiyu-kobo.co.jp/-cz
http://www.sajatypeworks.com
http://www.typography.netD
http://r3.o.lencr.Dll
http://www.founder.com.cn/cn/cThe
http://www.founder.com.cn/cnq
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
http://www.fontbureau.comgreta
http://r3.i.lencr.org/05
http://www.jiyu-kobo.co.jp/Tpq
http://r3.o.lencr.org0
http://www.galapagosdesign.com/DPlease
http://www.fonts.com
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://www.sakkal.com
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
http://cps.root-x1.letsencrypt.org0
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
http://DynDns.comDynDNS
http://cps.letsencrypt.org0
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
http://www.jiyu-kobo.co.jp/N
http://www.founder.com.cn/cn/=
http://r3.o.lencr.D
http://www.jiyu-kobo.co.jp/jp/
http://www.carterandcone.coml
http://www.founder.com.cn/cn/
http://www.fontbureau.com/designers/cabarga.htmlN
http://dicon.md
http://www.founder.com.cn/cn
http://www.fontbureau.com/designers/frere-jones.html
http://www.jiyu-kobo.co.jp/Y0/
http://www.jiyu-kobo.co.jp/q
http://www.monotype.
http://www.fontbureau.comm
http://www.jiyu-kobo.co.jp/
http://mail.dicon.md
http://www.fontbureau.com/designers8
http://www.jiyu-kobo.co.jp/tion

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL document.exe.log
ASCII text, with CRLF line terminators
#