General
-
Target
82ea203ea87c9cdb6090eb33435067a3db373adcd0f485cde84d88b363d6e82b
-
Size
245KB
-
Sample
240428-bl2z4sda71
-
MD5
29b63d1cef2be44750c9a3fa60432d77
-
SHA1
dcd58c72c76a9a3f92d61316f3d70c939e854d9d
-
SHA256
82ea203ea87c9cdb6090eb33435067a3db373adcd0f485cde84d88b363d6e82b
-
SHA512
18e34749e8709931c7fae42dcf6ba3adb9ccf4428d79cf32c95e72f38563b035299f26047679f4017a54331d807b1ddddade7e115d66e46bed6b4bad2da80a99
-
SSDEEP
3072:zPkeqfrvzvx5Bsig4qvZSTu7OBtUgnlVW5QVDoJxH:zMeqfrvzvx5BRg4blz5n31DK
Behavioral task
behavioral1
Sample
82ea203ea87c9cdb6090eb33435067a3db373adcd0f485cde84d88b363d6e82b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
82ea203ea87c9cdb6090eb33435067a3db373adcd0f485cde84d88b363d6e82b.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.2mfs.net - Port:
587 - Username:
info@2mfs.net - Password:
ibile.ibile@123 - Email To:
info@2mfs.net
Extracted
Protocol: smtp- Host:
mail.2mfs.net - Port:
587 - Username:
info@2mfs.net - Password:
ibile.ibile@123
Targets
-
-
Target
82ea203ea87c9cdb6090eb33435067a3db373adcd0f485cde84d88b363d6e82b
-
Size
245KB
-
MD5
29b63d1cef2be44750c9a3fa60432d77
-
SHA1
dcd58c72c76a9a3f92d61316f3d70c939e854d9d
-
SHA256
82ea203ea87c9cdb6090eb33435067a3db373adcd0f485cde84d88b363d6e82b
-
SHA512
18e34749e8709931c7fae42dcf6ba3adb9ccf4428d79cf32c95e72f38563b035299f26047679f4017a54331d807b1ddddade7e115d66e46bed6b4bad2da80a99
-
SSDEEP
3072:zPkeqfrvzvx5Bsig4qvZSTu7OBtUgnlVW5QVDoJxH:zMeqfrvzvx5BRg4blz5n31DK
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1