General
-
Target
f78da01163593111a987c0f7c4f275e5e39fadf2a788309e5accec1127486c50
-
Size
548KB
-
Sample
240910-c5qa4avbpe
-
MD5
6c705fa8fe0d80c0a4954c6c8bd3a8d2
-
SHA1
605679a8f47d0495c0a3e371490bb2074494cc76
-
SHA256
f78da01163593111a987c0f7c4f275e5e39fadf2a788309e5accec1127486c50
-
SHA512
f446c79fd9d3223d0443868d428c80958e752702fc7a19f70bf20106d728c95eab57c839c819f71df8e56686b0af72ebeaa3043efb3bb9a7484abe1b551a21ac
-
SSDEEP
12288:7ROKcbiOX+GdKO2ZQyNXy3LLWXmeuT78POKFGijU4x7dmWR/P88flt3+Ut:sbiA+ux2ZS3LCWeuT78POZQ7IE8+ltBt
Behavioral task
behavioral1
Sample
Bank slip.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bank slip.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rrcindia.co.in - Port:
587 - Username:
[email protected] - Password:
Goyal@0783 - Email To:
[email protected]
Targets
-
-
Target
Bank slip.exe
-
Size
573KB
-
MD5
910da75d1c40740e17a0ab0b3eb14cf1
-
SHA1
42461054f817eaa161787deda99bb3455ed959c7
-
SHA256
815f7166e2d4007e6181aef6e1f7c82a320dfb3b84a610a065db6a3cf8982873
-
SHA512
491d75253e91e2487e8cfdbd7309fee4a13c5641c7d12d739ee23b16b3b6510bb043a79e2a8bbfcba8716aa7244fa675074973cdf5f72dd8daf837c6a7debe6d
-
SSDEEP
12288:cXe9PPlowWX0t6mOQwg1Qd15CcYk0We1FxnU4xZdmWx/P8mfVt3D34PIF:5hloDX0XOf4HZI+8QVtz34wF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-