General
-
Target
Booking_0106.7z
-
Size
1.3MB
-
Sample
241006-nl5gfs1fqp
-
MD5
b7d1844927401c8860e032f9de51c628
-
SHA1
8d7e8c705e751d4dd40c1059cab46d0906f2af1f
-
SHA256
c937bfa23674a47c5ffc5b6a14178fef2698bfdf5d5919c4a9414fbd952506cc
-
SHA512
83fb5edff2b90b3ba45b2f08a78bd3e044bb12282b6bf78fdf6c6f96ad25768b7537e8581675dd59cd43175648847cd25097a6c7077b2cd0b2018816d4db862f
-
SSDEEP
24576:bBbX8OWCTcIT4Xr6UzgEpm1wVvRHjmD6FfldNIVewQdpg6EXDiMRHYJ:1IOTTcIT471zgEpvvlPfNIVewZ8
Static task
static1
Behavioral task
behavioral1
Sample
Booking_0106.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Booking_0106.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
ABwuRZS5Mjh5
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
ABwuRZS5Mjh5 - Email To:
[email protected]
Targets
-
-
Target
Booking_0106.exe
-
Size
1.9MB
-
MD5
219bc0b3320f5f73d684f07800c0134d
-
SHA1
867abe30a0018c0c902f11a9edfb7c0262cdedf5
-
SHA256
4d7489c7f5c86e43100b25314f49f3577d43ae47e090b0916578da82ec3d59e6
-
SHA512
4bec94a472bdbd156f22bd4eddb44bb8b2c11910e4c12269fa73a7f71f4f290db4eb9014bf5e1ba322c97af7a195081821d35848b6ea93dce5e05a18cd6c88a4
-
SSDEEP
49152:2RvAXWfY323knu/nL1Pv4ZWrgN4l07QfR0feTtH8FmmCCCCCvaFK3:UfrU2pSsF8FmmCCCCCL3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1