General
-
Target
0bf4d14c8cec8f44b0c85da0df126606b0a34829c430d89a21ee47b865cfc9d4
-
Size
20KB
-
Sample
240622-bmhymazfpc
-
MD5
c17a000a75e50f382f6ffec2d070ab8b
-
SHA1
2b270a900e9b499f8ae88ac1b02521dc882dd495
-
SHA256
0bf4d14c8cec8f44b0c85da0df126606b0a34829c430d89a21ee47b865cfc9d4
-
SHA512
d7491a173af9f7ead502d31d683daa75f3240c8093a67864f8808a2d93cca6f39bcc657dbda8eaced7eef8f505cd1afbb15ada3d8db21809e31f0d287e420f5b
-
SSDEEP
384:Qsz6lEJmkO5IpSFO4zGENprg/skcs0yCjxaMmi:QvlEoN8d4ltzQJi
Behavioral task
behavioral1
Sample
0bf4d14c8cec8f44b0c85da0df126606b0a34829c430d89a21ee47b865cfc9d4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0bf4d14c8cec8f44b0c85da0df126606b0a34829c430d89a21ee47b865cfc9d4.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
purecrypter
https://nexoproducciones.cl/Iajjilhvtid.mp3
Extracted
agenttesla
Protocol: smtp- Host:
mail.wassadadvogados.com.br - Port:
587 - Username:
[email protected] - Password:
TkuGA;DYH+It - Email To:
[email protected]
Targets
-
-
Target
0bf4d14c8cec8f44b0c85da0df126606b0a34829c430d89a21ee47b865cfc9d4
-
Size
20KB
-
MD5
c17a000a75e50f382f6ffec2d070ab8b
-
SHA1
2b270a900e9b499f8ae88ac1b02521dc882dd495
-
SHA256
0bf4d14c8cec8f44b0c85da0df126606b0a34829c430d89a21ee47b865cfc9d4
-
SHA512
d7491a173af9f7ead502d31d683daa75f3240c8093a67864f8808a2d93cca6f39bcc657dbda8eaced7eef8f505cd1afbb15ada3d8db21809e31f0d287e420f5b
-
SSDEEP
384:Qsz6lEJmkO5IpSFO4zGENprg/skcs0yCjxaMmi:QvlEoN8d4ltzQJi
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-