General
-
Target
471e1552c28823dc7f3fe17abde8666e573db5d41b030aa3c46acb92f0aa7512
-
Size
11KB
-
Sample
240617-bdmv8a1crm
-
MD5
34e104205244cdd76c3420d734066b02
-
SHA1
8a3e1a2736de563e2f32abe631db0be24e992b16
-
SHA256
471e1552c28823dc7f3fe17abde8666e573db5d41b030aa3c46acb92f0aa7512
-
SHA512
f5f37381493da8adb036290927067aefb939544fc52de13c1f116c97b76a139fde07cfa5ed123a4af9a12994abfccd88e9219b6f7b4dc2c021a9fc15bc9c70b0
-
SSDEEP
96:Yf3HO3KJey0wOmtFHBRl4gYxuT40VYglYdCVzUg4pZOnENiUgzNt:u3OXrenRT40VuwVgg4pZ/N9i
Behavioral task
behavioral1
Sample
471e1552c28823dc7f3fe17abde8666e573db5d41b030aa3c46acb92f0aa7512.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
471e1552c28823dc7f3fe17abde8666e573db5d41b030aa3c46acb92f0aa7512.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
purecrypter
https://www.vascocorretora.com.br/PPI/Xarooah.vdf
Extracted
agenttesla
https://api.telegram.org/bot7245016847:AAHTGgEGytVrrQCnyNC6RGvqcnPdZoR0H5U/
Targets
-
-
Target
471e1552c28823dc7f3fe17abde8666e573db5d41b030aa3c46acb92f0aa7512
-
Size
11KB
-
MD5
34e104205244cdd76c3420d734066b02
-
SHA1
8a3e1a2736de563e2f32abe631db0be24e992b16
-
SHA256
471e1552c28823dc7f3fe17abde8666e573db5d41b030aa3c46acb92f0aa7512
-
SHA512
f5f37381493da8adb036290927067aefb939544fc52de13c1f116c97b76a139fde07cfa5ed123a4af9a12994abfccd88e9219b6f7b4dc2c021a9fc15bc9c70b0
-
SSDEEP
96:Yf3HO3KJey0wOmtFHBRl4gYxuT40VYglYdCVzUg4pZOnENiUgzNt:u3OXrenRT40VuwVgg4pZ/N9i
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-