General
-
Target
Booking_01233.exe
-
Size
1011KB
-
Sample
241002-kyq8ta1gpe
-
MD5
2ab6a7c2935b9ff57cd37b5c42b9e3c9
-
SHA1
1df75d3fe3d8d87557f2a5c380ed4543706afe14
-
SHA256
fe55a513bf664ba039c2161ea279df894bb133b7d441d1af7057624588cc6c61
-
SHA512
160f67a6be1dee6a006d074786c6f4e558970a66bcfcbb173b36c0575e6772fb88b4a65de3bfb67bee0e2564cdc98d2e1890382f3f4770ef3b4066789dffdc8c
-
SSDEEP
24576:SrBQNmbwBHPD7fDr/3H7Pn8KLZ0U7d6ltdd89:6imkBHPD7fDr/3H7Pn8KLZ0o4PK9
Static task
static1
Behavioral task
behavioral1
Sample
Booking_01233.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Booking_01233.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
ABwuRZS5Mjh5
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
ABwuRZS5Mjh5 - Email To:
[email protected]
Targets
-
-
Target
Booking_01233.exe
-
Size
1011KB
-
MD5
2ab6a7c2935b9ff57cd37b5c42b9e3c9
-
SHA1
1df75d3fe3d8d87557f2a5c380ed4543706afe14
-
SHA256
fe55a513bf664ba039c2161ea279df894bb133b7d441d1af7057624588cc6c61
-
SHA512
160f67a6be1dee6a006d074786c6f4e558970a66bcfcbb173b36c0575e6772fb88b4a65de3bfb67bee0e2564cdc98d2e1890382f3f4770ef3b4066789dffdc8c
-
SSDEEP
24576:SrBQNmbwBHPD7fDr/3H7Pn8KLZ0U7d6ltdd89:6imkBHPD7fDr/3H7Pn8KLZ0o4PK9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1