General
-
Target
Compra_600000376.001
-
Size
567KB
-
Sample
241115-vt1lssyaqa
-
MD5
a72f4506922701f357767064415c845a
-
SHA1
c26d95b6b65eaa7c1ab1300f6c1d6bd1ad0bb16c
-
SHA256
883520fe10700a49aaf93a8d0fea197c7aca4d3af10c409f4210cb0cfaed75e9
-
SHA512
0a9d31abb15bdb7ca5b1123a419988fe0c5c75ebd4b54420a8e9c2d84d997880110a82469c66b0599ccf2e1db57dc9294b0b71a6ebb03b9ef570bbcc1d8b17d5
-
SSDEEP
12288:MCmPDbtgglk3nYsDe48pPGm/5NoTsTdeb5JlOap2ax:yPntggYnLqeg5NHQbeax
Behavioral task
behavioral1
Sample
Compra_600000376.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Compra_600000376.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Compra_600000376.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Compra_600000376.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
out.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.stingatoareincendii.ro - Port:
21 - Username:
[email protected] - Password:
3.*RYhlG)lkA
Targets
-
-
Target
Compra_600000376.001
-
Size
567KB
-
MD5
a72f4506922701f357767064415c845a
-
SHA1
c26d95b6b65eaa7c1ab1300f6c1d6bd1ad0bb16c
-
SHA256
883520fe10700a49aaf93a8d0fea197c7aca4d3af10c409f4210cb0cfaed75e9
-
SHA512
0a9d31abb15bdb7ca5b1123a419988fe0c5c75ebd4b54420a8e9c2d84d997880110a82469c66b0599ccf2e1db57dc9294b0b71a6ebb03b9ef570bbcc1d8b17d5
-
SSDEEP
12288:MCmPDbtgglk3nYsDe48pPGm/5NoTsTdeb5JlOap2ax:yPntggYnLqeg5NHQbeax
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
-
-
Target
Compra_600000376.exe
-
Size
649KB
-
MD5
63abd958f823c530adf43b1bb352682b
-
SHA1
1c1e62524bab0ae93b5cacc96c6131d7ae807668
-
SHA256
78ba167393b90253983058b4b3456dc65d3bb07d10bc61c70e5b4f5d5d43ad96
-
SHA512
20e39b473d83aa25c2cb420f73577b49ea11569833315051bcab140e51b7a01ca749b33c33bbae797e5dfb5c8d549e6204f49a8b2c3983bb3dba9b7e1b5201db
-
SSDEEP
12288:POv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPifUcTb1x7uA/bJUkpaY1:Pq5TfcdHj4fmbsUmO8JUO1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
-
-
Target
out.upx
-
Size
1.1MB
-
MD5
36d79cd93e422eb066f41e8b61d3c384
-
SHA1
0d49e9b11bf551baf2d19ca2d2a314e15a0673d0
-
SHA256
02aa920f492e6f997d4129dabeb50c1d7cfebc0013a5d23dcfe77474317aa596
-
SHA512
0140f86c60e5dd4ee0f250419436f6e40c02682b6469c9e7aa02f06f1b2ac023a73d23325a87b84e7e734f465b272675b68594fa02c3402c05b5811fa6c867c9
-
SSDEEP
12288:rtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNxPPpHPUcTb1x7uA/bJUkpaY1:rtb20pkaCqT5TBWgN5BUmO8JUO1
Score1/10 -