Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2024, 01:08
Behavioral task
behavioral1
Sample
c78dea179e7d5aed1b4a52c44b5534cdac0be1f47be4dfdc3958bd22eb48838e.exe
Resource
win7-20241023-en
General
-
Target
c78dea179e7d5aed1b4a52c44b5534cdac0be1f47be4dfdc3958bd22eb48838e.exe
-
Size
315KB
-
MD5
afbf66c51d101896506dad8d878983b1
-
SHA1
af7571404b866f2dcdb29646a22b2fb43dae24ad
-
SHA256
c78dea179e7d5aed1b4a52c44b5534cdac0be1f47be4dfdc3958bd22eb48838e
-
SHA512
79915269341a868f325864f357d1a623630c74f09baad8f174c61b6e4ab2817c3bbb913cd54688694cee2afcbf80ad7ac5766230d86330fb8878432e89dad3f8
-
SSDEEP
3072:nyJ2gdhvYEQ8wkRgdwxkRFuLhftfYhf0QUvYSnt4l0dzhaZpPEkmj:h0vYEQ8wkRgLPsNtf3Jvv4lOe
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
uy,o#mZj8$lY
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c78dea179e7d5aed1b4a52c44b5534cdac0be1f47be4dfdc3958bd22eb48838e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4900 c78dea179e7d5aed1b4a52c44b5534cdac0be1f47be4dfdc3958bd22eb48838e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c78dea179e7d5aed1b4a52c44b5534cdac0be1f47be4dfdc3958bd22eb48838e.exe"C:\Users\Admin\AppData\Local\Temp\c78dea179e7d5aed1b4a52c44b5534cdac0be1f47be4dfdc3958bd22eb48838e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4900