General
-
Target
Alternate.exe
-
Size
2.1MB
-
Sample
240629-tc428atekk
-
MD5
ee8b0fd296424672386887f65f6337dc
-
SHA1
5f304431e0567be1fe839da127e038e7542048ba
-
SHA256
a1132e70c6cbacd1dff8b9ccb5baa96c23a4ef65151b847d4871ea66f922c805
-
SHA512
b1e7828c0202425ae9b5317a37ba2f9e616e9b36258a64b2a044af47aa65c5dc35dc3e0c2ac064373dd527bad0b1ff2cd974a90e4181c3118fad5db3770fc626
-
SSDEEP
49152:/Uu2QESFm62RgvIg+EyEhjMtSmjPnREvVzp8D+xoe:2SkvRgZ0EKgBvVKy
Static task
static1
Behavioral task
behavioral1
Sample
Alternate.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1256630214449172480/KPSOBnkaIxsSCBfUjQjFjqFs81SqowDleEn5uuMYiQyvvhycJrsUT_kLVBqKjx_ijiXR
Targets
-
-
Target
Alternate.exe
-
Size
2.1MB
-
MD5
ee8b0fd296424672386887f65f6337dc
-
SHA1
5f304431e0567be1fe839da127e038e7542048ba
-
SHA256
a1132e70c6cbacd1dff8b9ccb5baa96c23a4ef65151b847d4871ea66f922c805
-
SHA512
b1e7828c0202425ae9b5317a37ba2f9e616e9b36258a64b2a044af47aa65c5dc35dc3e0c2ac064373dd527bad0b1ff2cd974a90e4181c3118fad5db3770fc626
-
SSDEEP
49152:/Uu2QESFm62RgvIg+EyEhjMtSmjPnREvVzp8D+xoe:2SkvRgZ0EKgBvVKy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Downloads MZ/PE file
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1