General
-
Target
DESIGN LOGO.zip
-
Size
1.6MB
-
Sample
241124-qcj59sxlbn
-
MD5
3ad5c267e0244dcdd5ae80f465242781
-
SHA1
2417bb1f8f5d1f2b3d75766c3680ae0f976c08d8
-
SHA256
4fcf4c3ed006f60b20cde17f41060d2fe6b5b48bfbc3331408c417df171b3c0d
-
SHA512
ba24faad6849ac6a8c993e5f01727999fb73d810588f287e5dad9a64875b348312113b5c3b391ee0c51d85bc65aebe7c7328437352ea8038765fd2125ae1ad1e
-
SSDEEP
24576:aHA1dv/io7GoA9V1ncWvQHPATFswHz1z+kbcfqhB1stcC3oPxPVOc68Uja9DRuZB:6AnXihogvhQvAps0qkgUBY+PTlFFRA
Behavioral task
behavioral1
Sample
DESIGN LOGO.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/
Targets
-
-
Target
DESIGN LOGO.exe
-
Size
1.7MB
-
MD5
97042a029def0b48a06a31d39d32654f
-
SHA1
6ddba4f407409166bb39e03ba4d9ff528d38d636
-
SHA256
bf9d54dce88b260dbf1ce555bd7abdd98b030bb3ee2170d51272c1b0ec8605a0
-
SHA512
72f5a89e5c6e7d880c3d3bb39efea644cf402d80c6f9b9b771c2158e4e6095ec5aab9306aab8510a8b7bf1c7609f644fc8f24220e9260e247bbcdb3f07607e50
-
SSDEEP
49152:WA6OSh5GOieweChL9K+Dg0CoGIlcYtpGdb:WAzFh100CwG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1