General
-
Target
Nota de aviso de pagamento 2028242575.img
-
Size
1.2MB
-
Sample
230504-xb7cqsgc4z
-
MD5
1eda04592d13bd25af575abcc758920f
-
SHA1
015c5033962fc72ec0da84b24c115aeffbc4c79a
-
SHA256
4e5adbeec13351073966ef1359fb442cfcf1ca6e1aa8485804f9281c65c3d276
-
SHA512
cf938fda484f2a08160c25081aba075bf106800767dc846800c473dffc437a4a98d64968027922981349915274bba53297488dfdefd3dd8b8b73f7e15cedb085
-
SSDEEP
192:b0r/h4MHhYM1xQoSiKGureT0FDCkUUKZB2FvC5bjlb/bbxR4imW4xBq34Po:YVmHGureT0FKUUB4alZbbbxRmNB3Po
Static task
static1
Behavioral task
behavioral1
Sample
NOTA_DE_.chm
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
NOTA_DE_.chm
Resource
win10v2004-20230220-es
Malware Config
Extracted
https://mailink.app/K72.txt
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.kamen.si - Port:
21 - Username:
[email protected] - Password:
Motherland23@
Targets
-
-
Target
NOTA_DE_.CHM
-
Size
17KB
-
MD5
bb8f93b0d3d4705f5b392c86eb874026
-
SHA1
a966e0c6a9089cb0d2109bcf3f0af6259a9b40e0
-
SHA256
5a883d1a6f91650bdf834da1d2f95e7c02f1898dc4f9a4fed59c4b2c40b62f6d
-
SHA512
89547138d769841ea014d5623bc007bfb668b1b4d140d9c087311484f0457aebd83cc340c2d2275d7388e1cff405f572ea886be62318b810b874d858a2ebb042
-
SSDEEP
192:IGureT0FDCkUUKZB2FvC5bjlb/bbxR4imW4xBq34Pof:IGureT0FKUUB4alZbbbxRmNB3Pof
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-