General
-
Target
8402ed726c49025989f98d23ce9d7e3e.bin
-
Size
3KB
-
Sample
230617-bw94gahc9y
-
MD5
82490566dfd6092c11dfdf68f408392c
-
SHA1
fb5fda92591ae62601be9e74c1bdbb4e1dc6af2c
-
SHA256
a39cc0d58861c1b3df1a65929b71441f28852a99e407921045fe5062e5c20a15
-
SHA512
df97978099cc74b1fdc5b9a8268437a5a36d8c73526a038ce0520e0e1b3f765a1e76bb90b861dceeb745122bf03dc6b649d664cb4a9a68fd7432ca2e7b3ef4d3
Behavioral task
behavioral1
Sample
5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
purecrypter
https://files.catbox.moe/6dlgj3.mp4
Extracted
agenttesla
https://api.telegram.org/bot2100759405:AAFzA0s7LpNOhvzQJo2bUlDpzSqnB8ir69o/
Targets
-
-
Target
5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe
-
Size
6KB
-
MD5
8402ed726c49025989f98d23ce9d7e3e
-
SHA1
e5784d2999ab073773b65e7d3a10ab2bb3460ff0
-
SHA256
5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb
-
SHA512
208fdd79dd0ff0a61a0dccc80ea718b6f6ef18151104d3d74753035e7ed2844facc07df1605af42dfbb6631971eff6e5ec4cecbbe42f93bef0e3c75d5c942ebc
-
SSDEEP
96:gzTFJVQ7mAK9KgeRZskYuIH7dYYyWwRkvPzNt:gHa7m79ETSuIH7dYYyYR
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-