General
-
Target
Acal BFi UK - Products List 020240704.exe
-
Size
341KB
-
Sample
240704-tvs3nsygpk
-
MD5
ee12c46b73b56744c0dfc093d681ac13
-
SHA1
c0ec40f38d10ac100473cf93c9a70b1f566cf55d
-
SHA256
d23bfe6129eb1b44c79612e9743c286ee15d5024e61796662c3fb86cf0d27141
-
SHA512
e67fe7f2708ab10910610757eaa8068430d5652f9549c1fc969efe96637084fbb7812a62e34ba8bbc960c00d97b7266b3e4eb385cfca1d5c0d9565486cec8281
-
SSDEEP
768:4weX0qJNPaYNsQe21zEjss2S3g1Ircn0sspAgpq8bLyg1uMN0+dzsR0+eE2:2TuQbk/pqELy0uyT+f2
Static task
static1
Behavioral task
behavioral1
Sample
Acal BFi UK - Products List 020240704.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Acal BFi UK - Products List 020240704.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:2005
79.110.62.113:2005
0QFmCI3ycTg10NnI
-
install_file
USB.exe
Extracted
agenttesla
https://api.telegram.org/bot7121198832:AAHWmvzY7jDQqG8pk3uwnutesjvQDyHyYTs/
Targets
-
-
Target
Acal BFi UK - Products List 020240704.exe
-
Size
341KB
-
MD5
ee12c46b73b56744c0dfc093d681ac13
-
SHA1
c0ec40f38d10ac100473cf93c9a70b1f566cf55d
-
SHA256
d23bfe6129eb1b44c79612e9743c286ee15d5024e61796662c3fb86cf0d27141
-
SHA512
e67fe7f2708ab10910610757eaa8068430d5652f9549c1fc969efe96637084fbb7812a62e34ba8bbc960c00d97b7266b3e4eb385cfca1d5c0d9565486cec8281
-
SSDEEP
768:4weX0qJNPaYNsQe21zEjss2S3g1Ircn0sspAgpq8bLyg1uMN0+dzsR0+eE2:2TuQbk/pqELy0uyT+f2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
StormKitty payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-