General
-
Target
d32a5c5eb5d8662968a19211c7a8eb39d600bf1562cc6aa9dba0f7d6b0eb2fbe
-
Size
840KB
-
Sample
240923-gpjwlaxhkk
-
MD5
a725491288d92b0a51cdd34aedd8b2ce
-
SHA1
8ce3b8fb443574811bb5154c5a39f6208feb29b8
-
SHA256
d32a5c5eb5d8662968a19211c7a8eb39d600bf1562cc6aa9dba0f7d6b0eb2fbe
-
SHA512
ecd3ba07333ad6884f46ad50b7d4966cae8bbfacbdec434c94d014f9b1dad52ddea8d6d8b7a0540c2c4bc20d4b92d9683d50a0ea918b6dc55925432ebbdaf975
-
SSDEEP
24576:rzFh6Ax5KkdYBlfjkbxgyostXQS6SFr2L7:XFh6MKkWLGR6z
Static task
static1
Behavioral task
behavioral1
Sample
Halk Bank.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Halk Bank.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.laboratoriosvilla.com.mx - Port:
587 - Username:
[email protected] - Password:
WZ,2pliw#L)D - Email To:
[email protected]
Targets
-
-
Target
Halk Bank.exe
-
Size
1.1MB
-
MD5
9d89bf38f44abe7199f4b7e34cebc254
-
SHA1
eb48fb2f074aae30481beac7867794eb62cc383e
-
SHA256
516b4492c4c76ba5d22f4e3867184816033a72712f7348f3d00d7903533fd7a3
-
SHA512
345ac5d5b303253a2b42a366b9ece2fd0d5617bb6bd6b8cc4e26d4b9ffb5768d048c46723f35e0cd8dcd2bde3832245f515636b3d3b638aeba76d4332f743ddf
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCkGI07jkbxayssxXQo60Hr8L1:7JZoQrbTFZY1iaCBvnGLmh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-