flash

sale order.exe

Status: finished
Submission Time: 14.10.2021 05:29:23
Malicious
Trojan
Adware
Spyware
Evader
AgentTesla

Comments

Tags

  • exe

Details

  • Analysis ID:
    502597
  • API (Web) ID:
    870170
  • Analysis Started:
    14.10.2021 05:29:24
  • Analysis Finished:
    14.10.2021 05:38:33
  • MD5:
    9d3fe8ed9fd927c91dd268f70a4c20b9
  • SHA1:
    0f0fe91255fd8af65bc2c03eb4ac63c888e600c9
  • SHA256:
    81c6ab8a5c8ea969d37b9b55d052cf8b352109f1d7e85e1115570f54e542b7c2
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

IPs

IP Country Detection
182.50.132.92
Singapore

Domains

Name IP Detection
sg2plcpnl0023.prod.sin2.secureserver.net
182.50.132.92

URLs

Name Detection
http://127.0.0.1:HTTP/1.1
http://www.fontbureau.com/designersG
http://www.fontbureau.com/designers/?
Click to see the 48 hidden entries
http://www.founder.com.cn/cn/bThe
https://certs.starfieldtech.com/repository/0
http://certificates.starfieldtech.com/repository/0
http://www.fontbureau.com/designers?
http://crl.starfieldtech.com/sfig2s1-169.crl0c
http://www.tiro.com
http://eOPeED.com
http://ocsp.starfieldtech.com/0;
http://www.fontbureau.com/designers
http://www.goodfont.co.kr
http://www.collada.org/2005/11/COLLADASchema9Done
http://ocsp.starfieldtech.com/0F
http://www.sajatypeworks.com
http://www.typography.netD
http://www.founder.com.cn/cn/cThe
http://www.galapagosdesign.com/staff/dennis.htm
http://fontfabrik.com
http://www.founder.com.cn/cn/c
http://crl.microsoft.co
http://www.galapagosdesign.com/DPlease
https://92rgATMXZYKxK.net
https://api.ipify.org%GETMozilla/5.0
http://www.fonts.com
http://www.sandoll.co.kr
http://www.urwpp.deDPlease
http://www.zhongyicts.com.cn
http://crl.starfieldtech.co
http://www.sakkal.com
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
http://www.apache.org/licenses/LICENSE-2.0
http://www.fontbureau.com
http://DynDns.comDynDNS
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
http://certs.starfieldtech.com/repository/1402
http://crl.starfieldtech.com/sfroot-g2.crl0L
http://www.tiro.comn
http://sg2plcpnl0023.prod.sin2.secureserver.net
https://api.ipify.org%$
http://www.carterandcone.coml
http://www.fontbureau.com/designers/cabarga.htmlN
http://www.founder.com.cn/cn
http://www.fontbureau.com/designers/frere-jones.html
http://www.fontbureau.comm
http://www.jiyu-kobo.co.jp/
http://certs.starfieldtech.com/reposi
http://www.fontbureau.como
http://www.fontbureau.com/designers8
http://certificates.starfieldtech.com/repository/sfig2.crt0

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NXLun.exe.log
ASCII text, with CRLF line terminators
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\sale order.exe.log
ASCII text, with CRLF line terminators
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#