General
-
Target
potvrda_transakcije.exe
-
Size
631KB
-
Sample
240919-jr3slaxhrg
-
MD5
aa0e19576e5634701bd583e196877856
-
SHA1
5a75ec4ddc5f7cc2f30d8a289f91c8f62067ffaf
-
SHA256
f07d13e42a388a55a358a07cfdcb04d0dcb4ac4219b6805372dea3567d97f591
-
SHA512
8f9efe1e3fbc2e6a464b4347e597a67573a412525bac228413503af4661dcca6b4021425c6c7d117128444c4362466858b7395514e445775654a9e7834ac03fa
-
SSDEEP
12288:UHafApk9jQrYuqyVJ5XAn29p42Ng0aYO0p/hNXda5vcmjLI20mNv:U6fAu9sFxX9pv9W4TsNjLIG
Static task
static1
Behavioral task
behavioral1
Sample
potvrda_transakcije.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
potvrda_transakcije.exe
Resource
win7-20240903-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
Q6]7rLSD*gU2
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.jeepcommerce.rs - Port:
21 - Username:
[email protected] - Password:
Q6]7rLSD*gU2
Targets
-
-
Target
potvrda_transakcije.exe
-
Size
631KB
-
MD5
aa0e19576e5634701bd583e196877856
-
SHA1
5a75ec4ddc5f7cc2f30d8a289f91c8f62067ffaf
-
SHA256
f07d13e42a388a55a358a07cfdcb04d0dcb4ac4219b6805372dea3567d97f591
-
SHA512
8f9efe1e3fbc2e6a464b4347e597a67573a412525bac228413503af4661dcca6b4021425c6c7d117128444c4362466858b7395514e445775654a9e7834ac03fa
-
SSDEEP
12288:UHafApk9jQrYuqyVJ5XAn29p42Ng0aYO0p/hNXda5vcmjLI20mNv:U6fAu9sFxX9pv9W4TsNjLIG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-