General
-
Target
EXTRACTO BANCARIO.PDF.bat.exe
-
Size
379KB
-
Sample
230606-mtys7sdg4y
-
MD5
83feada9a3286828aa97e58014dd0750
-
SHA1
86124ee8bb31d7bead2472234d4cafe8f19b5f25
-
SHA256
9a128d7ba3cf8ed1f2aba6a777a44cf9580376cb8c2f44c5cc139fad08399f20
-
SHA512
46b7eb3a31a68dd62218430da75c275bf6b025cab28365b9aff7bbdd6c44de76d713d8403eb0cce71b028bb8852a9c747170b871ed73ad8bdf63eace923f45fd
-
SSDEEP
6144:NIw3EwpCSb69ZYNDuvH4zdEFa70ij9+ThwjKvpNwYH3JdPEnNi9eRDVFkC/TlO5u:gSbqaAoduu0BtWOpN7X/ERDJQ5ygA
Static task
static1
Behavioral task
behavioral1
Sample
EXTRACTO BANCARIO.PDF.bat.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
EXTRACTO BANCARIO.PDF.bat.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.phytomer.es - Port:
587 - Username:
[email protected] - Password:
@Paqui0033-* - Email To:
[email protected]
Targets
-
-
Target
EXTRACTO BANCARIO.PDF.bat.exe
-
Size
379KB
-
MD5
83feada9a3286828aa97e58014dd0750
-
SHA1
86124ee8bb31d7bead2472234d4cafe8f19b5f25
-
SHA256
9a128d7ba3cf8ed1f2aba6a777a44cf9580376cb8c2f44c5cc139fad08399f20
-
SHA512
46b7eb3a31a68dd62218430da75c275bf6b025cab28365b9aff7bbdd6c44de76d713d8403eb0cce71b028bb8852a9c747170b871ed73ad8bdf63eace923f45fd
-
SSDEEP
6144:NIw3EwpCSb69ZYNDuvH4zdEFa70ij9+ThwjKvpNwYH3JdPEnNi9eRDVFkC/TlO5u:gSbqaAoduu0BtWOpN7X/ERDJQ5ygA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-