General
-
Target
MHI-240303pdf.exe
-
Size
188KB
-
Sample
240809-js2a6asbmd
-
MD5
cb936d794ad9e2f8f9ab5fef64ae5f84
-
SHA1
181313fa0ee181c8081de2e43a97f4463cc1733b
-
SHA256
7583bb3483b1654698092b76f818775c8a70ce7faf4b59bf44791582dfb3b3f2
-
SHA512
58ddbc556ed625f784ad990eb5dcefb743ca233b4af680fe9e82fa1d6c4d4ed562f217b505acf138f56f2c1df4e7395ca793ecef07c2483bd0fda40c32b6bec7
-
SSDEEP
3072:PCgylHJJR7Gc65xSfWD4PWMhL+TyUcVmx8MdcBBp3LcYUUUb7GmCMY7pdkJ:nvSfWcevTyU3xhGrp3LcYUUU2
Static task
static1
Behavioral task
behavioral1
Sample
MHI-240303pdf.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
MHI-240303pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://80.92.205.47 - Port:
21 - Username:
delizzasuppl - Password:
99EK7bvTZr4zBnwW
Targets
-
-
Target
MHI-240303pdf.exe
-
Size
188KB
-
MD5
cb936d794ad9e2f8f9ab5fef64ae5f84
-
SHA1
181313fa0ee181c8081de2e43a97f4463cc1733b
-
SHA256
7583bb3483b1654698092b76f818775c8a70ce7faf4b59bf44791582dfb3b3f2
-
SHA512
58ddbc556ed625f784ad990eb5dcefb743ca233b4af680fe9e82fa1d6c4d4ed562f217b505acf138f56f2c1df4e7395ca793ecef07c2483bd0fda40c32b6bec7
-
SSDEEP
3072:PCgylHJJR7Gc65xSfWD4PWMhL+TyUcVmx8MdcBBp3LcYUUUb7GmCMY7pdkJ:nvSfWcevTyU3xhGrp3LcYUUU2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-