General
-
Target
detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exe
-
Size
557KB
-
Sample
240522-ra3p9sdh4z
-
MD5
a9c5337e7c384d5156d58d5b8ec7effa
-
SHA1
34b32c66b09fa6b02c94dae25a6df9f2ea2ba6ef
-
SHA256
c2865edc8458f593826eb983978f6256230e74610d4947506de9fbce5061cf2a
-
SHA512
310e347a4791f86228b18d2e696f78fd395df1405bc131b5bd4f8d901489054deb8cb8c2bf732126eccc0fd2e3e06b550408e9e466be422e6e06782bfd5f8b14
-
SSDEEP
6144:IcBvWsKG0/FpgG+cSjnXDrEGTKqXyqX6Xu7klJyk6XwG+435lRvWtRSNQABuX+rl:xKEGzSjDwI6XDc+Y+trf+rl
Static task
static1
Behavioral task
behavioral1
Sample
detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.Privateemail.com - Port:
587 - Username:
[email protected] - Password:
V8~vk=Wnsf,N - Email To:
[email protected]
Targets
-
-
Target
detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exe
-
Size
557KB
-
MD5
a9c5337e7c384d5156d58d5b8ec7effa
-
SHA1
34b32c66b09fa6b02c94dae25a6df9f2ea2ba6ef
-
SHA256
c2865edc8458f593826eb983978f6256230e74610d4947506de9fbce5061cf2a
-
SHA512
310e347a4791f86228b18d2e696f78fd395df1405bc131b5bd4f8d901489054deb8cb8c2bf732126eccc0fd2e3e06b550408e9e466be422e6e06782bfd5f8b14
-
SSDEEP
6144:IcBvWsKG0/FpgG+cSjnXDrEGTKqXyqX6Xu7klJyk6XwG+435lRvWtRSNQABuX+rl:xKEGzSjDwI6XDc+Y+trf+rl
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
12b140583e3273ee1f65016becea58c4
-
SHA1
92df24d11797fefd2e1f8d29be9dfd67c56c1ada
-
SHA256
014f1dfeb842cf7265a3644bc6903c592abe9049bfc7396829172d3d72c4d042
-
SHA512
49ffdfa1941361430b6acb3555fd3aa05e4120f28cbdf7ceaa2af5937d0b8cccd84471cf63f06f97cf203b4aa20f226bdad082e9421b8e6b62ab6e1e9fc1e68a
-
SSDEEP
192:gFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/nC93:E7pJp48F2exrg5F/C
Score3/10 -