top title background image
flash

SecuriteInfo.com.Trojan.PackedNET.471.11170.exe

Status: finished
Submission Time: 2021-01-27 16:07:30 +01:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • AgentTesla

Details

  • Analysis ID:
    345039
  • API (Web) ID:
    591988
  • Analysis Started:
    2021-01-27 16:11:18 +01:00
  • Analysis Finished:
    2021-01-27 16:22:35 +01:00
  • MD5:
    1b02147d8324319176d52cd01a9c8cb5
  • SHA1:
    2f3db6efb3e8f2a026f0d5c6fd31b5f876a1a7e5
  • SHA256:
    ee68f6e98ab3a08359259951be151d5293a17590514bfa55faccc8c9a6dd2af6
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 28/71
malicious
Score: 14/46

IPs

IP Country Detection
64.29.145.40
United States
54.225.220.115
United States

Domains

Name IP Detection
mail.stonemfg.net
64.29.145.40
elb097307-934924932.us-east-1.elb.amazonaws.com
54.225.220.115
api.ipify.org
0.0.0.0

URLs

Name Detection
http://95NMlRr4OGKVr7aF.net
https://api.ipify.orgGETMozilla/5.0
https://api.ipify.org/
Click to see the 20 hidden entries
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
https://simpletimelapse.sourceforge.io/update/version.txtwhttps://simpletimelapse.sourceforge.io/upd
https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://mail.stonemfg.net
https://www.flaticon.com/packs/free-basic-ui-elements
https://simpletimelapse.sourceforge.io/update/version.txt
https://ffmpeg.org
http://simpletimelapse.sourceforge.net/update/version.txt?Refresh=
http://XFpcVI.com
https://simpletimelapse.sourceforge.io/update/changelog.txt
https://api.telegram.org/bot%telegramapi%/
https://api.lightboot.org/panel/index.php?page=Api&key=b6udeJ2WqDoyHKzzsEjfG3QajboCjeJv&host=
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
http://ocsp.sectigo.com0
https://sectigo.com/CPS0
http://DynDns.comDynDNS
https://api.ipify.org
http://127.0.0.1:HTTP/1.1
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.PackedNET.471.11170.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp4D3A.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\VjyQvBtzZaz.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Roaming\VjyQvBtzZaz.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\2zksojgg.12e\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3032001
#