General
-
Target
341c577082740e45bd8cd65b44cef857b80f864dbaf4f5c77d7c1b0756265b1d
-
Size
814KB
-
Sample
240909-qblyga1gpc
-
MD5
a97e092a84de94edfe0b3e699ed08bc6
-
SHA1
eccb0f0690bb9616c38a48ad573d5431a673714c
-
SHA256
341c577082740e45bd8cd65b44cef857b80f864dbaf4f5c77d7c1b0756265b1d
-
SHA512
19041ef1d53219569ee6a465eb6f98338d11415eeb4a6db9421053dfa00b6bf7121a9cfef1427bfa34689554ddc55232d00250ee7b211f5a948ae5ddc9a8bf22
-
SSDEEP
24576:wqf8c7eFSjr7ZWN056DITTYyN4O5SyEuDe7Y:wqEc77jIukITTYyL5Syn
Static task
static1
Behavioral task
behavioral1
Sample
PCA9626B,118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PCA9626B,118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.medicalhome.com.pe - Port:
587 - Username:
[email protected] - Password:
MHinfo01 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.medicalhome.com.pe - Port:
587 - Username:
[email protected] - Password:
MHinfo01
Targets
-
-
Target
PCA9626B,118.exe
-
Size
866KB
-
MD5
cb9e1d1bbe47f48fc4e5160f7ad601da
-
SHA1
1ff552e59a6d88d7600130113f88a75e4f88c8cc
-
SHA256
77529cc504690e79a72680d72b42be8f021f5b2799fbce50bed59637dc4aa5b2
-
SHA512
cdda2bc4607929f0a89566ac5dc0234e8140e0698a467922434724d50d76c9436ff7bfc141f2f469efeb85bbe239a487412fd059c5d44129473f70176adb8286
-
SSDEEP
24576:uHf2Uol0ge2X7EXMuYcXrcMt/nzzGcXNyIEikE:uHfql0IL6MuYcXL/zzGcX7w
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1