flash

ot.msi

Status: finished
Submission Time: 01.04.2021 17:38:52
Malicious
Trojan
Spyware
Evader
AgentTesla GuLoader

Comments

Tags

Details

  • Analysis ID:
    380171
  • API (Web) ID:
    662472
  • Analysis Started:
    01.04.2021 17:40:13
  • Analysis Finished:
    01.04.2021 17:56:57
  • MD5:
    946a444c46b1e672e4eb35725993e1de
  • SHA1:
    12482793a22afbf1835887d0368ca0dc363f1ae7
  • SHA256:
    40879e36f47835c7af7d4e54d844469e5a1f58fda44027a9005ca61bf33d4a6d
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious

IPs

IP Country Detection
192.185.29.233
United States
116.203.34.79
Germany
185.81.0.109
Italy
Click to see the 1 hidden entries
79.134.225.109
Switzerland

Domains

Name IP Detection
fibertech.ae
192.185.29.233
mail.fibertech.ae
0.0.0.0
sogecoenergy.com
116.203.34.79
Click to see the 2 hidden entries
mariotessarollo.com
185.81.0.109
www.sogecoenergy.com
0.0.0.0

URLs

Name Detection
https://mariotessarollo.com/or/ag.binhttps://www.sogecoenergy.com/or/ag.bin
https://mariotessarollo.com/ot/ot.binen
https://mariotessarollo.com/=
Click to see the 27 hidden entries
https://mariotessarollo.com/ot/ot.bini
https://mariotessarollo.com/ot/ot.bin
https://mariotessarollo.com/ot/ot.binhttps://www.sogecoenergy.com/ot/ot.bin
https://mariotessarollo.com/ot/ot.binU
https://u28IS26ZRk5fJwhXK.org
https://mariotessarollo.com/
https://mariotessarollo.com/ows
https://mariotessarollo.com/ot/ot.binb
https://www.sogecoenergy.com/or/ag.bin
https://mariotessarollo.com/or/ag.bin
http://mail.fibertech.ae
http://127.0.0.1:HTTP/1.1
http://DynDns.comDynDNS
https://www.sogecoenergy.com/ota.bin
http://cps.letsencrypt.org0
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
https://www.sogecoenergy.com/ot/ot.bin
http://r3.o.l
https://api.ipify.org%$
http://r3.i.lencr.org/0
http://r3.i.lencr.org/05
http://r3.o.lencr.org0
https://api.ipify.org%GETMozilla/5.0
http://aMDPVn.com
http://fibertech.ae
http://cps.root-x1.letsencrypt.org0
http://www.yandex.comsocks=http=

Dropped files

Name File Type Hashes Detection
C:\Users\user\Afkodedes8\asparagussens.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\ota.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\Lageradministrationernes5\Hubey7.exe
data
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Roaming\hmoc4uig.ba3\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3032001
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#