top title background image
flash

SOA.exe

Status: finished
Submission Time: 2021-08-03 21:30:19 +02:00
Malicious
Trojan
Adware
Spyware
Evader
AgentTesla

Comments

Tags

  • AgentTesla
  • exe

Details

  • Analysis ID:
    458920
  • API (Web) ID:
    826489
  • Analysis Started:
    2021-08-03 21:30:20 +02:00
  • Analysis Finished:
    2021-08-03 21:39:43 +02:00
  • MD5:
    170f199a743cc527f5f222594ae66559
  • SHA1:
    5de323016e6f72653d7350ba45dfc73a208a580a
  • SHA256:
    2b4fef6d86dbcf4905dc110ed199516a9162266d69486d0aa14c26b71c8072db
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 40/70
malicious
Score: 16/35
malicious
Score: 22/28

IPs

IP Country Detection
208.91.199.225
United States

Domains

Name IP Detection
us2.smtp.mailhostbox.com
208.91.199.225

URLs

Name Detection
https://api.ipify.org%$
http://www.fontbureau.com
http://www.galapagosdesign.com/
Click to see the 53 hidden entries
http://DynDns.comDynDNS
http://www.fontbureau.comF
https://sectigo.com/CPS0
http://www.jiyu-kobo.co.jp/S
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
http://www.jiyu-kobo.co.jp/J
http://hFHvHh.com
http://www.microsoft.
http://www.fontbureau.com/designers/frere-jones.htmlT
http://www.jiyu-kobo.co.jp/jp/
http://www.jiyu-kobo.co.jp/?
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
http://www.jiyu-kobo.co.jp/w
http://www.founder.com.cn/cn
http://www.founder.com.cn/cn-
http://www.jiyu-kobo.co.jp/s
http://www.fontbureau.comcomF
http://www.jiyu-kobo.co.jp/het
http://www.jiyu-kobo.co.jp/jp/)
http://www.ascendercorp.com/typedesigners.htmls
http://www.jiyu-kobo.co.jp/
http://www.jiyu-kobo.co.jp/n
http://ocsp.sectigo.com0A
http://www.fontbureau.comalic
http://i.imgur.com/blkrqBo.gifiThis
http://www.jiyu-kobo.co.jp/-
http://www.jiyu-kobo.co.jp/lt
http://127.0.0.1:HTTP/1.1
http://www.founder.com.cn/cnQ
http://www.sajatypeworks.com2
http://us2.smtp.mailhostbox.com
http://UYWn7rRVbuma0uFbuM.com
http://www.fontbureau.com/designers/2
http://www.sakkal.comh)
http://www.jiyu-kobo.co.jp/96
http://crl.usertrust.co:d
http://www.sajatypeworks.com
http://www.jiyu-kobo.co.jp/6
http://www.jiyu-kobo.co.jp/Y0fo?
http://www.ascendercorp.com/typedesigners.htmlX
http://www.jiyu-kobo.co.jp/)
http://www.jiyu-kobo.co.jp/Y0
http://www.founder.com.cn/cna
https://api.ipify.org%GETMozilla/5.0
http://www.fonts.com
http://www.sajatypeworks.coma
http://www.fontbureau.comtoTF?
http://www.urwpp.de
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
http://www.fontbureau.comalsd
http://www.founder.com.cn/cnd
http://www.galapagosdesign.com/staff/dennis.htmo&
https://static.hummingbird.me/anime/poster_images/000/010/716/large/0fd8df1b586e60a0b1591cd8555c072f

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SOA.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NXLun.exe.log
ASCII text, with CRLF line terminators
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#