General
-
Target
c5210dcae2936ca5424a1224ddc519bded76064115a95e58c722b69e96ac344c
-
Size
460KB
-
Sample
241121-vwxb6atpbx
-
MD5
a528109e5486419098353578bd5e662a
-
SHA1
597c6324eb2796a81f13d91cd12124734790210c
-
SHA256
c5210dcae2936ca5424a1224ddc519bded76064115a95e58c722b69e96ac344c
-
SHA512
6e4063ad6beb7f48539cc4590f8f61307cb3ad2415fe31d57919fbcc7e650ec9669108c2e55c474d09643064d550aab6c2a903ae284e2a7a2c46b2258e166b73
-
SSDEEP
12288:5kbUgoa8QQGqCwwrgSsfCzSr5Kh4gC1ki0ngHU:5fg7AGewUizSFKCgC14nB
Static task
static1
Behavioral task
behavioral1
Sample
c5210dcae2936ca5424a1224ddc519bded76064115a95e58c722b69e96ac344c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c5210dcae2936ca5424a1224ddc519bded76064115a95e58c722b69e96ac344c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_dol - Password:
Doll900#@
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2241_dol - Password:
Doll900#@
Targets
-
-
Target
c5210dcae2936ca5424a1224ddc519bded76064115a95e58c722b69e96ac344c
-
Size
460KB
-
MD5
a528109e5486419098353578bd5e662a
-
SHA1
597c6324eb2796a81f13d91cd12124734790210c
-
SHA256
c5210dcae2936ca5424a1224ddc519bded76064115a95e58c722b69e96ac344c
-
SHA512
6e4063ad6beb7f48539cc4590f8f61307cb3ad2415fe31d57919fbcc7e650ec9669108c2e55c474d09643064d550aab6c2a903ae284e2a7a2c46b2258e166b73
-
SSDEEP
12288:5kbUgoa8QQGqCwwrgSsfCzSr5Kh4gC1ki0ngHU:5fg7AGewUizSFKCgC14nB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1