Overview
overview
10Static
static
1NUEVA ORDE...3).zip
windows10-2004-x64
1a66e05684c...9c.eml
windows10-2004-x64
3Orden_NM04...df.rar
windows10-2004-x64
10Orden_NM04...df.exe
windows10-2004-x64
10Outlook-Icon.jpg
windows10-2004-x64
1Outlook-j1cm1hfd.png
windows10-2004-x64
1email-html-2.html
windows10-2004-x64
4email-plain-1.txt
windows10-2004-x64
1General
-
Target
NUEVA ORDEN - NM049300 FERMAXIA-password(QKmLgls3).zip
-
Size
1.7MB
-
Sample
250517-zsx7hagk8y
-
MD5
45477e866dc304f06c3ae2c406b2bed1
-
SHA1
d253c156ce77e1a28abd5f87a42a06fb486a542b
-
SHA256
845c7e0dbf037bc7528dce1b3fb517dbdd584a3fdeb85e224069b7061f0f4883
-
SHA512
229d709840cd102f7205382297e456f9f34e3bef6e0987007dfd215e3b4fcc855a9dffc520dd2c38e282f1473b1af195af66c835bb47a51ddce090f4c80052b5
-
SSDEEP
49152:Xd4s577LSOsddvNmNrJJkMWlg4cE1pH2QNxfhl4:N4s5sdsNrJJkHllHL2QNN4
Static task
static1
Behavioral task
behavioral1
Sample
NUEVA ORDEN - NM049300 FERMAXIA-password(QKmLgls3).zip
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
a66e05684cd828e5a9b1771963a0121a13c7304a2a4037920dfb54d476575f9c.eml
Resource
win10v2004-20250502-en
Behavioral task
behavioral3
Sample
Orden_NM049300 FERMAXIA.pdf.rar
Resource
win10v2004-20250502-en
Behavioral task
behavioral4
Sample
Orden_NM049300 FERMAXIA.pdf.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral5
Sample
Outlook-Icon.jpg
Resource
win10v2004-20250502-en
Behavioral task
behavioral6
Sample
Outlook-j1cm1hfd.png
Resource
win10v2004-20250502-en
Behavioral task
behavioral7
Sample
email-html-2.html
Resource
win10v2004-20250502-en
Behavioral task
behavioral8
Sample
email-plain-1.txt
Resource
win10v2004-20250502-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.lampadari.gr - Port:
21 - Username:
[email protected] - Password:
P8P[uVeJU=vh
Targets
-
-
Target
NUEVA ORDEN - NM049300 FERMAXIA-password(QKmLgls3).zip
-
Size
1.7MB
-
MD5
45477e866dc304f06c3ae2c406b2bed1
-
SHA1
d253c156ce77e1a28abd5f87a42a06fb486a542b
-
SHA256
845c7e0dbf037bc7528dce1b3fb517dbdd584a3fdeb85e224069b7061f0f4883
-
SHA512
229d709840cd102f7205382297e456f9f34e3bef6e0987007dfd215e3b4fcc855a9dffc520dd2c38e282f1473b1af195af66c835bb47a51ddce090f4c80052b5
-
SSDEEP
49152:Xd4s577LSOsddvNmNrJJkMWlg4cE1pH2QNxfhl4:N4s5sdsNrJJkHllHL2QNN4
Score1/10 -
-
-
Target
a66e05684cd828e5a9b1771963a0121a13c7304a2a4037920dfb54d476575f9c.eml
-
Size
1.7MB
-
MD5
911b986bbfad904ca8481f54d6a30293
-
SHA1
353d5e1d066d6e70e95bd7dcc10369d82701dab1
-
SHA256
a5402b71761d83b2bb8b91f6c56a522aa820db06608464ed8d551976dad6d8b1
-
SHA512
96e8489534e77c241154fcfa7270df1405497aeef854b90a1002fd3a95eceea4cfa4c322846e7c9e6929f278e2a2f913cfa090b6aed6152e55c0df292c4e8fb3
-
SSDEEP
24576:IBqnTANlmGdVkRCRS/l2oU2N0xBXYse9NgdUA+tzS1N8b5I3ITcv5pMMMkEKWvQU:IQBFCQnN0xBXC9NLx2GSaspMMREKfKL
Score3/10 -
-
-
Target
Orden_NM049300 FERMAXIA.pdf.001
-
Size
1.2MB
-
MD5
c17880bfc903d02a80f6b80e1abaafb4
-
SHA1
6b28c236aca016d67c705b58f3fee69e09ce920b
-
SHA256
e375e707631fd52a260161035ef7bf639f1d94338a169c733c6729f73d2eaf8b
-
SHA512
56e7e0e1d5c7762ea781c7c402db6c0e248ebe9e3cb0123ce9bafd3858091ec317b3bb750533e725071de107605e7b870c3b7868830ea48400b058bbb96ca06a
-
SSDEEP
24576:Bp6YIm4/bYfz3CgmpifFsIEV21zm/WNB0moL5F3ffr50ZQmx5+dxjuhIxq:BpiKLbfFsZ213NB095FHN0yA5w4Ixq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Orden_NM049300 FERMAXIA.pdf.exe
-
Size
139.0MB
-
MD5
f401a397d3c7b5a1085b07e0af7ec1f1
-
SHA1
595764cfd5c9c3879b67654715cb61e29d96d2f1
-
SHA256
6625cf920ee3eff3570c976c4dd2ce2bd603ab7b5982b413f691b931a80df134
-
SHA512
f6c83fd9863bd4d90493d6010eb87fe52c04bc564189471ce352660e5041df06704448a55c48864b05c580308adf4df34a608094487e385f1794bc1a1bfec04d
-
SSDEEP
24576:Jhl1uwXZu1sz7qxCbNFJoL2Ia0lit0moAp3nadNxkrDKWyD71yClk:Dlow37Lb3JoKIa0DmnnadNae1/lk
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Outlook-Icon
-
Size
699B
-
MD5
b9b94095f69913212fad8c83a833c03d
-
SHA1
d3a104431c79bad961b7ec9c5b06ac4dd5fdb4fc
-
SHA256
4b628a711bb7d4dab5f643bf48819e7234d0f2fecf5b5bf96f0577291480f1e3
-
SHA512
e6036782d08dcda8a0db9b0ffc1c1c06fcbaa6033e72e72c55f760648f0890f9e1aa6067de933722de87829e4dd6e096dc44a4584ce0a4d267b102aaedc45173
Score1/10 -
-
-
Target
Outlook-j1cm1hfd.png
-
Size
28KB
-
MD5
5b33d248b42e8e1dd92d247fd37db0c0
-
SHA1
01c639d6ea8ab2f0b4370b0075c04459dec80b6c
-
SHA256
9a9897fbaa4887c478674dddecd582b99f25e0b143856a91fb2234f9936f304b
-
SHA512
433ee78e0e9c42e7ebb38f68995a2a5e68f3047033deadb2529e3c7ce85bf15be07dd01521c21e6c08f2c563d62ba0651c108b1f59bffa3d591e1bc8dab87a1b
-
SSDEEP
768:JAIN2axxSq5Uk95KldAexlznu9a3MZyxFmbck4AAq:pMmUqh95KldAMznj3MZyxFof
Score1/10 -
-
-
Target
email-html-2.txt
-
Size
9KB
-
MD5
772fa21b714bc471a4cd26f58b492a2b
-
SHA1
a26911ec7d84044e62cd442a19edd28af95140f5
-
SHA256
6e5f6b6f85fa72873074f9347f6888c7bdbd4d4dd598cf1b61bef37c71c6b876
-
SHA512
b4b65f171a19b8e1f143c1382665a9d95c236fcfd233887af3d8583eac81b93d0ea21ed34c85ce93f479e99958cb42f0d27030b9b356307dc73ea7c48a91bdc4
-
SSDEEP
96:ZEvAx9wQ2lQcQL7KQLnxKQLnKQLFXdDKQLdVgUlSHBamQLSLjKQLVKQMo4oP/ddJ:ZMlQv1nv5FXdNd+UlOBgSLtsywEPic
Score4/10 -
-
-
Target
email-plain-1.txt
-
Size
2KB
-
MD5
28917dee795fc079e82349b744c7398e
-
SHA1
4ca398c4db7f253f15af492a48e9a0148254bed5
-
SHA256
959a47225c3e6b3e6892bc7807c17037cfeb0d7f34689e12b79e1d7cd94b0787
-
SHA512
4d3c574c73b7e23a82aaf7611a7f7d977cad708ce071f18f00bdb82920ed170739d0420f077867987b5a5db199d0f8b54aa09c288ec675f782f87db98b816cfb
Score1/10 -
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2