General
-
Target
3702d77895124b57140bce0482029875be25274a2c30ec6d8fac8bbdfcd92394.exe
-
Size
300KB
-
Sample
241004-bpjmyazhmd
-
MD5
4fdf9741c120f25e66ba4cf07067c5d5
-
SHA1
7edfe85c45ead131f31f158c6c4ba2ef5f6291c8
-
SHA256
3702d77895124b57140bce0482029875be25274a2c30ec6d8fac8bbdfcd92394
-
SHA512
0a2194639ae4870cdc4cbfb74e3d7a5e7a5c24c22f35d1616acdcf0063d82e14d7b0c7b04427321b95d3dfa283970e0f4c90b7732d4cb1232461e06ab19d45b6
-
SSDEEP
6144:tqEttR2Nor0fA34WY4bBdTvki2QMqoFZRGILs1UbEIIRA7C+iwH2:nhfY0BdTsQMhFfGIxEIIK99
Static task
static1
Behavioral task
behavioral1
Sample
3702d77895124b57140bce0482029875be25274a2c30ec6d8fac8bbdfcd92394.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3702d77895124b57140bce0482029875be25274a2c30ec6d8fac8bbdfcd92394.exe
Resource
win10v2004-20240910-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/
Targets
-
-
Target
3702d77895124b57140bce0482029875be25274a2c30ec6d8fac8bbdfcd92394.exe
-
Size
300KB
-
MD5
4fdf9741c120f25e66ba4cf07067c5d5
-
SHA1
7edfe85c45ead131f31f158c6c4ba2ef5f6291c8
-
SHA256
3702d77895124b57140bce0482029875be25274a2c30ec6d8fac8bbdfcd92394
-
SHA512
0a2194639ae4870cdc4cbfb74e3d7a5e7a5c24c22f35d1616acdcf0063d82e14d7b0c7b04427321b95d3dfa283970e0f4c90b7732d4cb1232461e06ab19d45b6
-
SSDEEP
6144:tqEttR2Nor0fA34WY4bBdTvki2QMqoFZRGILs1UbEIIRA7C+iwH2:nhfY0BdTsQMhFfGIxEIIK99
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1