General
-
Target
7df729859c228320bad86d56619699472112fcdab2099c720771a9b24d2a76b7
-
Size
620KB
-
Sample
240829-pav93szhra
-
MD5
13eb873c3deb96c6f203471ae34333cb
-
SHA1
61ef1250d4a0299cdf7ebc32ccc46ba0fd15e8ee
-
SHA256
7df729859c228320bad86d56619699472112fcdab2099c720771a9b24d2a76b7
-
SHA512
12d74835fd1f38313ae9721581bb7e88bf7de82813938d8e867948c6756c2284d5c0f2d318e36a4b1664686b0c296088a0cacc815228f99b1426b3e28215ab44
-
SSDEEP
12288:C41+B+6EJV2a+QoAdXm3BA1joiJhDmJSp6RCeyi7tEH38utrORSkV3wcvRA0:X31Ya9dXm36VKJq6RCeyiRbhS2R
Static task
static1
Behavioral task
behavioral1
Sample
Balance payment.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Balance payment.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Targets
-
-
Target
Balance payment.exe
-
Size
1.2MB
-
MD5
2a9d09fc65e58d1589d0d10eb43c094a
-
SHA1
411e29bdd4bf197ad7a44d4c675e0c0dd78538dd
-
SHA256
0fc79caa00d59d4864ef9d4218cf238e52ae8208906c8e4d0a5d8e81c3607eb4
-
SHA512
b67e6fb8a2a8d521ba395b8596c2d46212e631d1e04ccc0e67a0a50d6bd42943d1ff2b1aa9a4f317a1cc4fadfa930c80c4b88f97d484cd5ef0b6d3b82a4bd820
-
SSDEEP
24576:YB6iYOAM4OF+PMwrSVlbmfDYkhDvGtjXtGUAF9kJ7MqudghfEuCj0hThiHHxlhV0:YBDMw8LrMx
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1