General
-
Target
P.O 2023-69415002.bat
-
Size
1018KB
-
Sample
231011-yktnnshf9w
-
MD5
e4e1075b03f102d9d07619194b7e5fbb
-
SHA1
ef833d4052c3efff9315c8f2845c2d5e20f7165f
-
SHA256
b78cf80d94f017c5f389590f2f3b312f1694d93e5e6aebf296e46b5b9dbca2da
-
SHA512
1faffae63d7e4731ecc30b1c02f60625632d5c2cc9944dc2870acf75fcb50bd66cd32f893f68a2400bdd21f06da6086a760c3b654969829114c857faeaeb432e
-
SSDEEP
24576:/qfa722mM+vmWw3/MzxW2LhbOTx61lx6ULpzF:ku+HxVbOVyT
Static task
static1
Behavioral task
behavioral1
Sample
P.O 2023-69415002.bat
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
P.O 2023-69415002.bat
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.asiaparadisehotel.com - Port:
587 - Username:
[email protected] - Password:
r&@^4,D9~kF2 - Email To:
[email protected]
Targets
-
-
Target
P.O 2023-69415002.bat
-
Size
1018KB
-
MD5
e4e1075b03f102d9d07619194b7e5fbb
-
SHA1
ef833d4052c3efff9315c8f2845c2d5e20f7165f
-
SHA256
b78cf80d94f017c5f389590f2f3b312f1694d93e5e6aebf296e46b5b9dbca2da
-
SHA512
1faffae63d7e4731ecc30b1c02f60625632d5c2cc9944dc2870acf75fcb50bd66cd32f893f68a2400bdd21f06da6086a760c3b654969829114c857faeaeb432e
-
SSDEEP
24576:/qfa722mM+vmWw3/MzxW2LhbOTx61lx6ULpzF:ku+HxVbOVyT
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-