General
-
Target
Documentidispedizione.img
-
Size
1.2MB
-
Sample
241204-m7le2aynap
-
MD5
65d6a736eb794fc138eae7c254cf1c7c
-
SHA1
4145f7523c5cadfd714c4c4acf36b0cac3d9331a
-
SHA256
631f31e83817663a0e56b4fdf3643d150f5a84a5cdf7e61da773d9985b4ef9c5
-
SHA512
2c178b112c195597257145c7cb6a02a937a5751c2b03ef4cb2c2459b71c1653a52a5d7cae05be4ee50c7a4f752cffcefc4c2ec0afd11329d9c82bce3b50a9a35
-
SSDEEP
12288:SHadcxTchoKjyaOA/krybKcHGLoejfuLo8i5Zk:eadhaKuaOA/NYfuLo8iHk
Static task
static1
Behavioral task
behavioral1
Sample
Documenti di spedizione.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Documenti di spedizione.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Targets
-
-
Target
Documenti di spedizione.bat
-
Size
588KB
-
MD5
a10e959289c077bc452de5c48abd7262
-
SHA1
9b295da45f8cc4fa5e5b94ba1ad3de93c617eadf
-
SHA256
e246806c6b16a736f29c6c3677c9f9263c8a0dc347a92a4f2606e93b13aec707
-
SHA512
67e5e6cd4f850f889cc09ee909310691968dc6f44c8ab2a2c1628a42605c42b6c767fefe5454d6d29fbf0aeced3f99626f5bf4037a2f3de942a0156318015778
-
SSDEEP
12288:tHadcxTchoKjyaOA/krybKcHGLoejfuLo8i5Zk4:VadhaKuaOA/NYfuLo8iHk4
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Guloader family
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
192639861e3dc2dc5c08bb8f8c7260d5
-
SHA1
58d30e460609e22fa0098bc27d928b689ef9af78
-
SHA256
23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
-
SHA512
6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc
-
SSDEEP
192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1