General
-
Target
Overdue invoices list.gz
-
Size
459KB
-
Sample
250225-kmfb6szrz7
-
MD5
543c2434b1c08b73f65fee08dab88e34
-
SHA1
cc3965752e28f124a642b806ac3243a15f8d423a
-
SHA256
c737f9b2563773f7f36fb8e2b2d975289724d06414467d2383cf4a8e82ef119c
-
SHA512
2b107cab6465681ee9639149d8306d4032c75abe8b888070f400a261dd9c3f6f553aecc578dacb5570aa79c44eff503441ec405098041be4ba1b06a1c43a99ab
-
SSDEEP
12288:anTzg178/zT8Pr9X6r6dpxdVEtkB5RiP4:n1I/zT8d6rAEy/iA
Static task
static1
Behavioral task
behavioral1
Sample
Overdue invoices list.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Overdue invoices list.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Langbaaden.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Langbaaden.ps1
Resource
win10v2004-20250217-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Targets
-
-
Target
Overdue invoices list.bat
-
Size
588KB
-
MD5
b0aa6256cf3923d4077b54ecbd91dea5
-
SHA1
328cdfcd943b424f3cc91e06616fa712dbbb55b9
-
SHA256
a00bf3e3e9ca1d19b7f2668d143036aad1391cd8da67789da9843d08a0520768
-
SHA512
f0879513b33e8bfeeec7569e1f1b830cc6a6dc39b27f5e53343804ebef52b087386accb1ca487df52c3fddb8307c250e767d67406c7f8a081ec7b0e8417ee730
-
SSDEEP
6144:1p+ggBLPYy0WIFc5dRajUy/R4D7O9wWhrPtq+wHtWQscAElBPg0fVjjXTtqKdyn8:rzNWI+HGK7+tq+gWQ/TlzVjP0Ne0zBDg
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Guloader family
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
75ed96254fbf894e42058062b4b4f0d1
-
SHA1
996503f1383b49021eb3427bc28d13b5bbd11977
-
SHA256
a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
-
SHA512
58174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
SSDEEP
192:X24sihno0bW+l97H4GB7QDs91kMtwtobTr4u+QHbazMNHT7dmNIEr:m8vJl97JeoxtN/r3z7YV
Score3/10 -
-
-
Target
Langbaaden.Tik
-
Size
257KB
-
MD5
0b24239de4f08622c580128fb89f7dfc
-
SHA1
e4fbb29a95f6c4c26ea8ee0af40e895434b0a3ec
-
SHA256
a2db59ba324e60f92a800430550ff2d54e99ad4dd44e88037b297daa26954be0
-
SHA512
fee733c6ef84ca8fabfe859026c3fd8eb7cd8b953980d37ed3333d468ed12739a9bd6956579a489b623a3d8c74d7fffa304f7b3ecee2216f9b32129efa81bdfd
-
SSDEEP
6144:UESkdDbmtZnD2Vj7bLovRDuxYof+W4sMSq:vSkdDy7qt2d4Y04t7
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1