General
-
Target
4c87baef6850203e490e688b78e07d764e2ad978676667ecb6fd07efdb579567
-
Size
1.2MB
-
Sample
250222-bqxwyswrz2
-
MD5
07d9f281902b2343548260ad83dabff1
-
SHA1
b2dec4cf79eec3d31abe9289b824f802e2f6c273
-
SHA256
4c87baef6850203e490e688b78e07d764e2ad978676667ecb6fd07efdb579567
-
SHA512
36ab323cdf2fce0e27f1166f593370a095c072b7829cc26d5c4684d7e88d1d1946aeccf1eb9b9c20a9b2dd46ba8362bde0d300474dd57944c23871e07751654c
-
SSDEEP
24576:h36rrVVY0bpWTr0AK88jEHJpqzUZngQJsa+:h3ybpGgkppqz+OX
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Targets
-
-
Target
PO.bat
-
Size
702KB
-
MD5
0d35c3156b03e29ad07d6cf268c394a8
-
SHA1
446e9ccdb3a54abeaac38e088352b18f09640f03
-
SHA256
e37762c1624d0c77270d82c7e305e09aa32a3e20f017c0f4205ecac150910c29
-
SHA512
3e68842c306509ec4ec1c49afa84bae9d0f62b924a777a2e09b6af1381c4af9b90597b212851693a58819b38439898533c73ea14fafdae11b2d146e217bc2279
-
SSDEEP
12288:/36reEVVY0bT1WP7r0AK8XsjMrNHJpqzERZndvK7QJskkf9B9epdk9fVO:/36rrVVY0bpWTr0AK88jEHJpqzUZngQr
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Guloader family
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
6e55a6e7c3fdbd244042eb15cb1ec739
-
SHA1
070ea80e2192abc42f358d47b276990b5fa285a9
-
SHA256
acf90ab6f4edc687e94aaf604d05e16e6cfb5e35873783b50c66f307a35c6506
-
SHA512
2d504b74da38edc967e3859733a2a9cacd885db82f0ca69bfb66872e882707314c54238344d45945dc98bae85772aceef71a741787922d640627d3c8ae8f1c35
-
SSDEEP
192:MenY0qWTlt70IAj/lQ0sEWc/wtYbBH2aDybC7y+XBaIwL:M8+Qlt70Fj/lQRY/9VjjgL
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1