flash

SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe

Status: finished
Submission Time: 04.05.2021 21:59:47
Malicious
Trojan
Evader
AgentTesla

Comments

Tags

Details

  • Analysis ID:
    404310
  • API (Web) ID:
    710761
  • Analysis Started:
    04.05.2021 22:10:56
  • Analysis Finished:
    04.05.2021 22:20:42
  • MD5:
    cce6c363c0ff7ac663cd71c5906069a6
  • SHA1:
    98ad5e24bf99fbb4cf7bdcaa54b6d720064dc810
  • SHA256:
    b65eed317058df5ddd4247ec93ac2b555ae2c29b751ee455ceee3dd9b670ecad
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
96/100

malicious
19/62

malicious
19/47

URLs

Name Detection
http://127.0.0.1:HTTP/1.1
https://api.ipify.org%GETMozilla/5.0
https://discord.com/2
Click to see the 6 hidden entries
http://DynDns.comDynDNS
https://discord.com/
https://discord.com/6
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
http://mNVnNH.com
https://discord.com/:

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46243806.32106.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\notpad\notpad.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#