General
-
Target
5041673918XXXXX.BAT.exe
-
Size
330KB
-
Sample
231211-k6qx1scaa3
-
MD5
936f0aaff53261396d764a5429c6a05e
-
SHA1
c9b23f881ef506918a8b90a6789878e130fc2d55
-
SHA256
6c7a86fab40be3fa9a95bbeb52f9c790d239646d0ff8504cfa5629f4fd9a1f42
-
SHA512
84fa483869c5307f31496cc66847f777e8ddfe677b2694ec83385dddd34a0a571f36aa50edb39d4da5961346a62e161097c5e62e710795fd8569cfc2f76af967
-
SSDEEP
6144:P8LxBs9bI62/EJuzNsHyAOhJsiBQqu7mycVtXBpve5CzmTc/bfq6PfqpctSbT9k7:B1Ip85yAKJsienHqtuCzJTfPSYSbY
Static task
static1
Behavioral task
behavioral1
Sample
5041673918XXXXX.BAT.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
5041673918XXXXX.BAT.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.asiaparadisehotel.com - Port:
587 - Username:
[email protected] - Password:
^b2ycDldex$@
Targets
-
-
Target
5041673918XXXXX.BAT.exe
-
Size
330KB
-
MD5
936f0aaff53261396d764a5429c6a05e
-
SHA1
c9b23f881ef506918a8b90a6789878e130fc2d55
-
SHA256
6c7a86fab40be3fa9a95bbeb52f9c790d239646d0ff8504cfa5629f4fd9a1f42
-
SHA512
84fa483869c5307f31496cc66847f777e8ddfe677b2694ec83385dddd34a0a571f36aa50edb39d4da5961346a62e161097c5e62e710795fd8569cfc2f76af967
-
SSDEEP
6144:P8LxBs9bI62/EJuzNsHyAOhJsiBQqu7mycVtXBpve5CzmTc/bfq6PfqpctSbT9k7:B1Ip85yAKJsienHqtuCzJTfPSYSbY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-