General
-
Target
75b653491db31cbd74319e4931c3c7939dd9af965cbeb8c5d454c7b5983300e8
-
Size
548KB
-
Sample
240910-jbtjzssckp
-
MD5
7f8b5f195a8380339aea46210595d317
-
SHA1
6b55c94af575a7569819d975c74fc5167dd3337d
-
SHA256
75b653491db31cbd74319e4931c3c7939dd9af965cbeb8c5d454c7b5983300e8
-
SHA512
980179293d0c09d90aa0bef50c2945fb004b186fbe7a56184313b20431f334ca2c93109939d8023091db265b031fad773f4d27993b96d3182e89b602a36fe9f8
-
SSDEEP
12288:7ROKcbiOX+GdKO2ZQyNXy3LLWXmeuT78POKFGijU4x7dmWR/P88flt3+Ud:sbiA+ux2ZS3LCWeuT78POZQ7IE8+ltBd
Behavioral task
behavioral1
Sample
Remittance advice.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Remittance advice.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rrcindia.co.in - Port:
587 - Username:
[email protected] - Password:
Goyal@0783 - Email To:
[email protected]
Targets
-
-
Target
Remittance advice.exe
-
Size
573KB
-
MD5
910da75d1c40740e17a0ab0b3eb14cf1
-
SHA1
42461054f817eaa161787deda99bb3455ed959c7
-
SHA256
815f7166e2d4007e6181aef6e1f7c82a320dfb3b84a610a065db6a3cf8982873
-
SHA512
491d75253e91e2487e8cfdbd7309fee4a13c5641c7d12d739ee23b16b3b6510bb043a79e2a8bbfcba8716aa7244fa675074973cdf5f72dd8daf837c6a7debe6d
-
SSDEEP
12288:cXe9PPlowWX0t6mOQwg1Qd15CcYk0We1FxnU4xZdmWx/P8mfVt3D34PIF:5hloDX0XOf4HZI+8QVtz34wF
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-