General
-
Target
Pagamento BPER Banca _Swift_copy.bat
-
Size
18KB
-
Sample
230919-j9y75afg6x
-
MD5
c5338abfdd743b2d233198612c70437f
-
SHA1
eaf6bcc0f25b65400fe7558ec8113ecc0052134f
-
SHA256
9aea4a9e347ff1400444bd839ba7a573a5836d9133b5f2986662d847bdeeb70f
-
SHA512
b27a0236d8cded26ba2ed3b73f0c700a3ae4444588611ac63383d68b23629e7c627bfb6c772aa990ce2230d0dfa42bfef03e9d030fc76e25848b2da9d6759b72
-
SSDEEP
384:V5nHmivmk4mm5K89C5KRBc5TgUBP9yYRwP:V5HHvp4fKx51GO1yYe
Static task
static1
Behavioral task
behavioral1
Sample
Pagamento BPER Banca _Swift_copy.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Pagamento BPER Banca _Swift_copy.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.navel.pt - Port:
587 - Username:
[email protected] - Password:
Luis8204 - Email To:
[email protected]
Targets
-
-
Target
Pagamento BPER Banca _Swift_copy.bat
-
Size
18KB
-
MD5
c5338abfdd743b2d233198612c70437f
-
SHA1
eaf6bcc0f25b65400fe7558ec8113ecc0052134f
-
SHA256
9aea4a9e347ff1400444bd839ba7a573a5836d9133b5f2986662d847bdeeb70f
-
SHA512
b27a0236d8cded26ba2ed3b73f0c700a3ae4444588611ac63383d68b23629e7c627bfb6c772aa990ce2230d0dfa42bfef03e9d030fc76e25848b2da9d6759b72
-
SSDEEP
384:V5nHmivmk4mm5K89C5KRBc5TgUBP9yYRwP:V5HHvp4fKx51GO1yYe
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-