General
-
Target
Transferenciarecibo.exe
-
Size
448KB
-
Sample
230523-h3sakafb41
-
MD5
e7b62be8090ec0dc64e35039c97173da
-
SHA1
914f33cabb3fc5bfcdb09493bd4fc7aeef4c2637
-
SHA256
d056da5721cc045e4416722d34e460403271865a14d0ab042a3d2224a188851a
-
SHA512
ebb8c7b1d0d94433b29baaa2515d02829dda68dc8d36c4c0dcf069c653c1d61a3918673537825be2c6047ca5219663fd8ebf47f60be595ea8c654966c15555c7
-
SSDEEP
6144:/hRUeCcWlHD12IhuTW/HkdHLQYJotlrvMyMp6een79Z4ivUNDwof+nT:5QcWlh5yW89Zatl7Omn5Z1vUSoc
Static task
static1
Behavioral task
behavioral1
Sample
Transferenciarecibo.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Transferenciarecibo.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gamasof.com - Port:
587 - Username:
[email protected] - Password:
Mariana2020* - Email To:
[email protected]
Targets
-
-
Target
Transferenciarecibo.exe
-
Size
448KB
-
MD5
e7b62be8090ec0dc64e35039c97173da
-
SHA1
914f33cabb3fc5bfcdb09493bd4fc7aeef4c2637
-
SHA256
d056da5721cc045e4416722d34e460403271865a14d0ab042a3d2224a188851a
-
SHA512
ebb8c7b1d0d94433b29baaa2515d02829dda68dc8d36c4c0dcf069c653c1d61a3918673537825be2c6047ca5219663fd8ebf47f60be595ea8c654966c15555c7
-
SSDEEP
6144:/hRUeCcWlHD12IhuTW/HkdHLQYJotlrvMyMp6een79Z4ivUNDwof+nT:5QcWlh5yW89Zatl7Omn5Z1vUSoc
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-