General
-
Target
SecuriteInfo.com.W32.Injector.FIHC-3037.22773.exe
-
Size
105KB
-
Sample
220920-kybhcsgahn
-
MD5
ac4b11253fd63a6f272bf10dabdbfb01
-
SHA1
1892479a8d6b58642f57514b6bbd29ab4f7e5e62
-
SHA256
7e7e4ddcd61df737e689389da1b59df402521f3310ad402c0696b97cf6ce3a20
-
SHA512
34b90fb700e609065b1e0ecf8eaa3fa5f33ed470e8dd58b03874de808bbae304e52ac5c0f81c93e9ec798dcf6009cc76433899743fef8ea4db1fdb0fb9f60511
-
SSDEEP
3072:Us+LplNxNXz3lxRXJWfH1lzsf+BaMPEGNXA8rD:UsKxNX1AP14xA7NXjv
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.Injector.FIHC-3037.22773.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.Injector.FIHC-3037.22773.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.overviewsupplies.com/ - Port:
21 - Username:
[email protected] - Password:
w[3c2r?B,Of+
Extracted
Protocol: ftp- Host:
ftp.overviewsupplies.com - Port:
21 - Username:
[email protected] - Password:
w[3c2r?B,Of+
Targets
-
-
Target
SecuriteInfo.com.W32.Injector.FIHC-3037.22773.exe
-
Size
105KB
-
MD5
ac4b11253fd63a6f272bf10dabdbfb01
-
SHA1
1892479a8d6b58642f57514b6bbd29ab4f7e5e62
-
SHA256
7e7e4ddcd61df737e689389da1b59df402521f3310ad402c0696b97cf6ce3a20
-
SHA512
34b90fb700e609065b1e0ecf8eaa3fa5f33ed470e8dd58b03874de808bbae304e52ac5c0f81c93e9ec798dcf6009cc76433899743fef8ea4db1fdb0fb9f60511
-
SSDEEP
3072:Us+LplNxNXz3lxRXJWfH1lzsf+BaMPEGNXA8rD:UsKxNX1AP14xA7NXjv
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-