General
-
Target
law.exe.zip
-
Size
558KB
-
Sample
240917-ymk5ba1hlf
-
MD5
592adf5fb51e7c614b8f131381175e5d
-
SHA1
7c9511c59654d9dfdb2a7d0fdab9cc353b8b7f87
-
SHA256
a7ff0e0b901c2f9cfc1d6ccb3217240cb3245360136617f8b880b657a6246421
-
SHA512
d32f6ee88e9cfc5962ae61f742ede0eae8bd40a64815c8aac1b0c8b6390d760950b13b330e8d38b46d662a7d4701f307aef0fb987c9daea6818db3a8f0033538
-
SSDEEP
12288:zmXd0N+U7Sxcnm/kiH72Yi8ltxtkfF5LsaWD9DJWVFoZ1mRouPUW:zmNS+UGmnm/gYXt8sv9DJfSRPcW
Static task
static1
Behavioral task
behavioral1
Sample
c7513589f3f2e02007be1301c2f08c8809ea7526d85d7efcaf3bccf767a38855.exe
Resource
win10-20240404-en
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
DANIEL3116
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
DANIEL3116
Targets
-
-
Target
c7513589f3f2e02007be1301c2f08c8809ea7526d85d7efcaf3bccf767a38855.exe
-
Size
666KB
-
MD5
31f840efbb9f5116f6bf1334c1fd55fd
-
SHA1
003cc6c66f94c65625ea9506d71741662e28b8f4
-
SHA256
c7513589f3f2e02007be1301c2f08c8809ea7526d85d7efcaf3bccf767a38855
-
SHA512
22ee4bc1c8f0b889fb61a3ae89c8302689eaaaa7dcf1ced4ccdc6ecb6ef6bc16173175e5adcf4d25d5c13c1c0b9e6bdb0dafe5973fa4a5c8000060472408b980
-
SSDEEP
12288:3Bu9Wtu1btCYwnZcA+9VdGpf5ptSR3vSRgTsUrtUY/6ion:xu9WtECYwZP+DdusR3vSRgTdrym6p
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1