General
-
Target
f1d869db0318276e773c7fd81eff7eb730aeb53799d65550212c5d40c2136a9a
-
Size
692KB
-
Sample
240720-bqz2bazeln
-
MD5
733b3dd4df27fc87e74a40760ebc8197
-
SHA1
68b6ed23b6ccd7e520872f31564ea69d86024e16
-
SHA256
f1d869db0318276e773c7fd81eff7eb730aeb53799d65550212c5d40c2136a9a
-
SHA512
3c67a34b6229803ef43c91e49151bce19f1e53b44eb6ede24cb322e9dc62ac9b8ed231d12bcbd89d2ed4de7554a74d86c1099646ea4b6bd91f55872876199d3e
-
SSDEEP
12288:s5magq7rNf+wxvlP6DrzbNHTzluE7FPzK62ACvkqTht02aMeddq6YPTDZ:Nq3HvMDrzbNh7FLK627vkqNt0+Qdq6wh
Static task
static1
Behavioral task
behavioral1
Sample
f1d869db0318276e773c7fd81eff7eb730aeb53799d65550212c5d40c2136a9a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f1d869db0318276e773c7fd81eff7eb730aeb53799d65550212c5d40c2136a9a.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.deblokhoeve.be - Port:
587 - Username:
[email protected] - Password:
Blokhoeve2490.i
Extracted
agenttesla
Protocol: smtp- Host:
mail.deblokhoeve.be - Port:
587 - Username:
[email protected] - Password:
Blokhoeve2490.i - Email To:
[email protected]
Targets
-
-
Target
f1d869db0318276e773c7fd81eff7eb730aeb53799d65550212c5d40c2136a9a
-
Size
692KB
-
MD5
733b3dd4df27fc87e74a40760ebc8197
-
SHA1
68b6ed23b6ccd7e520872f31564ea69d86024e16
-
SHA256
f1d869db0318276e773c7fd81eff7eb730aeb53799d65550212c5d40c2136a9a
-
SHA512
3c67a34b6229803ef43c91e49151bce19f1e53b44eb6ede24cb322e9dc62ac9b8ed231d12bcbd89d2ed4de7554a74d86c1099646ea4b6bd91f55872876199d3e
-
SSDEEP
12288:s5magq7rNf+wxvlP6DrzbNHTzluE7FPzK62ACvkqTht02aMeddq6YPTDZ:Nq3HvMDrzbNh7FLK627vkqNt0+Qdq6wh
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1