General
-
Target
857768#bank telegraphic transfer copy.exe
-
Size
624KB
-
Sample
230509-mz4xeafd87
-
MD5
baf14a956f72c04a96a441bef83164db
-
SHA1
43af2b62ee3b392c8c2e51f9b3bb4e97e91f266b
-
SHA256
feae31de8c6c8cdd42411db959087e258aa5da132edb1f34cba5c13eaef56cd1
-
SHA512
8128001673651eaba889ee0dbd4bd3bc2a1a3296fd7f7e19d1bcb9ed1bd879800ea4304844bcc46263dc52db7a266b0ecdc519c008ebefe47a3298da0803c263
-
SSDEEP
12288:gi0NOK2IYHip+4+IUJ6XQ/b/LiPcGVGGUCoI+FL8S50D:giO8IlpEv6g/DKcGVG5CR+FLJ0
Static task
static1
Behavioral task
behavioral1
Sample
857768#bank telegraphic transfer copy.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
857768#bank telegraphic transfer copy.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://c5comunicacao.com.br - Port:
21 - Username:
[email protected] - Password:
ABule@2023
Extracted
Protocol: ftp- Host:
c5comunicacao.com.br - Port:
21 - Username:
[email protected] - Password:
ABule@2023
Targets
-
-
Target
857768#bank telegraphic transfer copy.exe
-
Size
624KB
-
MD5
baf14a956f72c04a96a441bef83164db
-
SHA1
43af2b62ee3b392c8c2e51f9b3bb4e97e91f266b
-
SHA256
feae31de8c6c8cdd42411db959087e258aa5da132edb1f34cba5c13eaef56cd1
-
SHA512
8128001673651eaba889ee0dbd4bd3bc2a1a3296fd7f7e19d1bcb9ed1bd879800ea4304844bcc46263dc52db7a266b0ecdc519c008ebefe47a3298da0803c263
-
SSDEEP
12288:gi0NOK2IYHip+4+IUJ6XQ/b/LiPcGVGGUCoI+FL8S50D:giO8IlpEv6g/DKcGVG5CR+FLJ0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-