General
-
Target
d19acda9e1da746d2c1f0b9b0a810a977cc7e48256de3dae9f07b9c5bf79c2e0
-
Size
346KB
-
Sample
241124-bmwjqawpdv
-
MD5
fa463114cb53575503e3963335bfb940
-
SHA1
b0d1067e0bf856e0521bb26abd84ef69a9866e17
-
SHA256
d19acda9e1da746d2c1f0b9b0a810a977cc7e48256de3dae9f07b9c5bf79c2e0
-
SHA512
b073da9ae3be8f5215659b1e1720fffa51e8599ddbdae169ef1483e892048bba9fe3d609e15af8decb317a4b9ddb4db521fba6907fb45136421b8a0bce0de0fa
-
SSDEEP
6144:GBlL/J6M1/BLB1X2Db0jllIf8Tu0NuYPUcb2RuMzbA0otv9vFw:EyM15Lf0sllI0Tue0kmHA3a
Static task
static1
Behavioral task
behavioral1
Sample
d19acda9e1da746d2c1f0b9b0a810a977cc7e48256de3dae9f07b9c5bf79c2e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d19acda9e1da746d2c1f0b9b0a810a977cc7e48256de3dae9f07b9c5bf79c2e0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/dkznkxdbox.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/dkznkxdbox.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot2021562129:AAG5jOD-8o1ZVDhFUnGUw6bzmNZXXfUtGN0/sendDocument
Targets
-
-
Target
d19acda9e1da746d2c1f0b9b0a810a977cc7e48256de3dae9f07b9c5bf79c2e0
-
Size
346KB
-
MD5
fa463114cb53575503e3963335bfb940
-
SHA1
b0d1067e0bf856e0521bb26abd84ef69a9866e17
-
SHA256
d19acda9e1da746d2c1f0b9b0a810a977cc7e48256de3dae9f07b9c5bf79c2e0
-
SHA512
b073da9ae3be8f5215659b1e1720fffa51e8599ddbdae169ef1483e892048bba9fe3d609e15af8decb317a4b9ddb4db521fba6907fb45136421b8a0bce0de0fa
-
SSDEEP
6144:GBlL/J6M1/BLB1X2Db0jllIf8Tu0NuYPUcb2RuMzbA0otv9vFw:EyM15Lf0sllI0Tue0kmHA3a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/dkznkxdbox.dll
-
Size
47KB
-
MD5
0b7ad8699439ce182b38af57ce27df00
-
SHA1
be832ae4c9122e1daf351a6724cbefcd4e4ff710
-
SHA256
40e4279cf55da1330a38525edaacba9c3d7ad3b135f932475825da7eaad5c5b2
-
SHA512
b8b1ddb60a38c0981ba97089a902dea44ffd32fd91c6a8d6a7412680cb7fa32d3a944e9c230ab40a0a0c9cbbf181cfab3a164e84f3007d4004f9e8b2930aa6a6
-
SSDEEP
768:FA7tb03mZjLV1cv0x3jcZ9p0v3dKBBtCdZXETxDvRyU7JHfePun:FA7cYjLV1Y0VApm34PtqZXETxDj78e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1