Overview
overview
10Static
static
3Req-No-480...ev.exe
windows7-x64
10Req-No-480...ev.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Structure ...00.exe
windows7-x64
7Structure ...00.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3General
-
Target
29042024_1012_29042024_Req-No-4800011619_Ruwais-Ref_Rev.rar
-
Size
517KB
-
Sample
240429-cm6kcsfb99
-
MD5
d356cad688de84f0ffb57b63191e1f98
-
SHA1
98272ce95810bb4191dc51b88fc578204fcf6da4
-
SHA256
f656fa2f7ff6cf97c06c7bd50a8f15e26b0b2326a999290098dd5200e0d9dd07
-
SHA512
19efae9a487452e833051b5593d77caf1aeabddd0a0f6813eed86d7f66a5d5069cffcf1b20b5346c0619e567b2cceb4b5de527ad32729ed8611864bd64a07018
-
SSDEEP
12288:XjlvLVBNqWnsnEfeivcfMlQUL3C3m/O76wnn:VVO4KfI+3cO7Xn
Static task
static1
Behavioral task
behavioral1
Sample
Req-No-4800011619_Rev.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Req-No-4800011619_Rev.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Structure description-Rev.00.exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
Structure description-Rev.00.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
projectlog@aflacltd.top - Password:
7213575aceACE@# - Email To:
project@aflacltd.top
Targets
-
-
Target
Req-No-4800011619_Rev.exe
-
Size
339KB
-
MD5
b8a8ca60146b0d8c08369576508d1536
-
SHA1
874411f2590bc45b83783be977e681328a30b067
-
SHA256
60e1db5951e3c8a6dbd797bc8925b45fba6e4ed4310b3ae98e40ab7652421e1f
-
SHA512
adc8fe76a1e49660ec981dcf243fb8a1e7a6784f2ab90e1e0d3fcd25123665c37d571603036640b833e216f3c96d6d89a4394137e843e39ee313807f9aee714b
-
SSDEEP
6144:EYa6EIIIIBDs7abZtyCE+D9hB6m82qaaza8e+r/Pu1AThPv:EYCw+bOj+D9j6N2qaMrn0AThn
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
cff85c549d536f651d4fb8387f1976f2
-
SHA1
d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
-
SHA256
8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
-
SHA512
531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
SSDEEP
192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
Score3/10 -
-
-
Target
Structure description-Rev.00.exe
-
Size
332KB
-
MD5
93ed4d71925bf64cc42cc9dd295d0394
-
SHA1
bb1feb06a69b108e103435bb5b498aab3c7315af
-
SHA256
e3b090f044833c0e9328593357138a307bcf2ce0ab4badc3fd766b83beb4af1b
-
SHA512
88a9d09fd2ba60f051bc86bf4c7dad87acbca6348e7380e21d635665aeaf7231842a7bd5f2b729bc93221bd6aa391e893f6f53d2c575aeadf512617b0d423f8e
-
SSDEEP
6144:EYa6EIIIIBDs7abo+8dlqp5PhyOH+lMkMPHTEJp7eOm9t1t7N1e:EYCw+bl5ZyOelMLLEJE19tP7N4
Score7/10-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
cff85c549d536f651d4fb8387f1976f2
-
SHA1
d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
-
SHA256
8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
-
SHA512
531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
SSDEEP
192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
Score3/10 -