General
-
Target
fc3dfe7f5685cd337382f585ffaf438256722a15303a86cac63d739a082ae3d5
-
Size
636KB
-
Sample
240803-bxlr9sydjm
-
MD5
9b1f3f664b27bdcd30e4992fb0740c75
-
SHA1
2f8f726cae1c784bad1f72314ac3c3584203ea92
-
SHA256
fc3dfe7f5685cd337382f585ffaf438256722a15303a86cac63d739a082ae3d5
-
SHA512
6c2bd271eb01fba7cb5f6989f9b6fee997cc9bef1c7960933742ff2f9df078728e865041923b679be30d36fa05b95f9f9a4ea7cbaa443adb4ababfb693bab6cf
-
SSDEEP
12288:zrDNzNooy/+6Q97fX5LUTQH0OYqTOsiE7Vrq9UIOkkEetJ7mBQGiek2:zrpzyQVRHHNYYiGV3RRLtJ7mBQyk2
Static task
static1
Behavioral task
behavioral1
Sample
Payment advice.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Payment advice.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rrcindia.co.in - Port:
587 - Username:
[email protected] - Password:
Goyal@0783 - Email To:
[email protected]
Targets
-
-
Target
Payment advice.exe
-
Size
1.1MB
-
MD5
bc7f5a3ffe1b7377b53f4d3682514224
-
SHA1
5b86b7ce857b243b96c8344d1357ad5cf1a94cfc
-
SHA256
fb04094c609fd7ab6e1130443f44d7fb62c5b565a4a8a806413e1e74ba1bf3c1
-
SHA512
09ba951b07eb916aae012e587a5ceceda763b301096a55b34b837d42f0d38044e0895bfb9d93828cf6979ee34c7927f2adc477a4f0e2284e49501bca25eda483
-
SSDEEP
24576:yqDEvCTbMWu7rQYlBQcBiT6rprG8aZFFhb7mZQMy:yTvC/MTQYxsWR7aZtb7mz
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-