General
-
Target
New Compressed (zipped) Folder.zip
-
Size
253KB
-
Sample
231213-cbanjsedfk
-
MD5
53dc6576ef56a38db13c8a1d9e0418b6
-
SHA1
259b66652dc7e4611d664834d59808adf92285a9
-
SHA256
4640e7ead55a52ee5ecf0d1f6625f78e04bc604eb63f3767e877da8c186175ce
-
SHA512
d53a4137b12ee20a88a4f01210ecb3459b71a6c10238dc179e019cacda80e7013a148d0b156fadcb5b094007adaeaef76b6f35d09674c4169369182b980cf32b
-
SSDEEP
6144:DckacEQLtW4qdCNSooiLsiUwfD48XCQgIhGQ2kR/G0puNDArB3:4xoW4SULsiUUD4E3gIAQ2/xY3
Static task
static1
Behavioral task
behavioral1
Sample
New Compressed (zipped) Folder.zip
Resource
win11-20231128-en
Malware Config
Extracted
https://bitbucket.org/!api/2.0/snippets/roootscauses/xqXo9n/cabaf10ca36d2fd137afe6909c393a2e3293dc4c/files/elanawork.html
Extracted
https://uploaddeimagens.com.br/images/004/667/608/original/hta.jpg?1700268840
https://uploaddeimagens.com.br/images/004/667/608/original/hta.jpg?1700268840
Extracted
https://bitbucket.org/!api/2.0/snippets/roootscauses/bqxMzd/fb4c52533bbd299e32e82694f8039669d184e596/files/moye.html
Extracted
https://uploaddeimagens.com.br/images/004/667/608/original/hta.jpg?1700268840
https://uploaddeimagens.com.br/images/004/667/608/original/hta.jpg?1700268840
Extracted
https://uploaddeimagens.com.br/images/004/683/779/original/download.jpg?1701878864
https://uploaddeimagens.com.br/images/004/683/779/original/download.jpg?1701878864
Extracted
remcos
RemoteHost
lora1.safesopkoco.com:2404
lora2.safesopkoco.com:2404
safesopkoco.com:2404
masterbotsbrothers.xyz:2404
mota1.masterbotsbrothers.xyz:2404
mota2.masterbotsbrothers.xyz:2404
lora1.safesopkoco.co:2404
lora2.safesopkoco.co:2404
lora2.safesopko.net:2404
lora1.safesopko.net:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-D4J8YD
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
agenttesla
https://api.telegram.org/bot6846062945:AAGabPi9vxKPIKfVbRT2fLEd-Rnu3DtD_6I/
Targets
-
-
Target
New Compressed (zipped) Folder.zip
-
Size
253KB
-
MD5
53dc6576ef56a38db13c8a1d9e0418b6
-
SHA1
259b66652dc7e4611d664834d59808adf92285a9
-
SHA256
4640e7ead55a52ee5ecf0d1f6625f78e04bc604eb63f3767e877da8c186175ce
-
SHA512
d53a4137b12ee20a88a4f01210ecb3459b71a6c10238dc179e019cacda80e7013a148d0b156fadcb5b094007adaeaef76b6f35d09674c4169369182b980cf32b
-
SSDEEP
6144:DckacEQLtW4qdCNSooiLsiUwfD48XCQgIhGQ2kR/G0puNDArB3:4xoW4SULsiUUD4E3gIAQ2/xY3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-