General
-
Target
19022025_1443_RICEVUTA DI PAGAMENTO.bat.iso
-
Size
1.8MB
-
Sample
250219-r3t9lavjz5
-
MD5
4f4336078fc5b5acdcf89d6c84b19946
-
SHA1
9e0a3ebb780013339301db69b6f7c8a055f3c0df
-
SHA256
b87109f4ac9d75b339c8fa1a08ac67db70d386eb73e95f88c47596bf3d94f7ea
-
SHA512
5cdd0a7bedf2b00b6943866ace7e624bd47f45618181030c44412af564ac133e05de9783bb7f374ae651a52c2c44975f014f40de9d21c2ee6308f28f2ec0db33
-
SSDEEP
49152:6NY1tpzsKc4nthNW3YU0E6DpDOPCBZOHHT:6NMpzsKnntSD16DpDO6
Static task
static1
Behavioral task
behavioral1
Sample
RICEVUTA DI PAGAMENTO.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RICEVUTA DI PAGAMENTO.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Targets
-
-
Target
RICEVUTA DI PAGAMENTO.bat
-
Size
1.3MB
-
MD5
f8918c093f62e7df3a88f3c55e5c62da
-
SHA1
5ece572d3d72558a1c044251cd521dd5e369a727
-
SHA256
356fd7a50b9d0c286d7251ede5b8e8ed9ec8c51a4480a88d5e054e52d352fec3
-
SHA512
462bfee0c1158847545a696e0354c4ca581f09ba822be2fe148e324fc21e5d04eac231de92674e30e962244d9dbf2ee2b1bb98ff8bcc095b109995ce54045298
-
SSDEEP
24576:iU9aY1wLhuxBr8sDzsKc4nVjhNW3CknC7/c2nEwRTPlJpDOPCBeuOHHTDf7:iNY1tpzsKc4nthNW3YU0E6DpDOPCBZOj
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Guloader family
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
fccff8cb7a1067e23fd2e2b63971a8e1
-
SHA1
30e2a9e137c1223a78a0f7b0bf96a1c361976d91
-
SHA256
6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
-
SHA512
f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c
-
SSDEEP
192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1