General
-
Target
Presupuesto.scr.exe
-
Size
1.8MB
-
Sample
250124-j4earszndm
-
MD5
3dce8f5b853374d0f7e8a97306727c07
-
SHA1
a852b55173976419ddddec6ef11ad79882140832
-
SHA256
e99a8a8773f059814fdcd835c6c7a8ae5284c4943987a374a96e14a8b799335d
-
SHA512
d45777e8f8b50356d0a96f64c1045bfda5e85f6928db3515af485add2ff178b694dacf5dd54d68a086667bc39a109d4765da985e3958cd5b24dee14cd732e7c0
-
SSDEEP
24576:tSstsds6ypgH+NKeeHsatx2B2ZGe3Mqqu5HtC/EuuE7niOIsUuX0CDn:l67p9HTHqkHMzTiEhD
Static task
static1
Behavioral task
behavioral1
Sample
Presupuesto.scr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Presupuesto.scr.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2241_evicb - Password:
Doll280@@
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_evicb - Password:
Doll280@@
Targets
-
-
Target
Presupuesto.scr.exe
-
Size
1.8MB
-
MD5
3dce8f5b853374d0f7e8a97306727c07
-
SHA1
a852b55173976419ddddec6ef11ad79882140832
-
SHA256
e99a8a8773f059814fdcd835c6c7a8ae5284c4943987a374a96e14a8b799335d
-
SHA512
d45777e8f8b50356d0a96f64c1045bfda5e85f6928db3515af485add2ff178b694dacf5dd54d68a086667bc39a109d4765da985e3958cd5b24dee14cd732e7c0
-
SSDEEP
24576:tSstsds6ypgH+NKeeHsatx2B2ZGe3Mqqu5HtC/EuuE7niOIsUuX0CDn:l67p9HTHqkHMzTiEhD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1