General
-
Target
209320f18913df5ab82d4792f58f43eff5b2348a4ce1498941f77c3e25b2531a
-
Size
433KB
-
Sample
241221-bk8fhaymbt
-
MD5
4aed28139d34fc600069e2c40af93191
-
SHA1
d1d5e25b63762d2169e19af7806db6007ae7c59b
-
SHA256
209320f18913df5ab82d4792f58f43eff5b2348a4ce1498941f77c3e25b2531a
-
SHA512
1b17c21da54cc6143f31899996caaf9646e25abc07675c910e0cd497c5e791d65c97c5e0287c9a46ec9feed3a0d45b72b0e8c4a3e29d247e37578aac06a456f7
-
SSDEEP
6144:8hiLixzOZNdgW0klCJ7Ub4igaEfr0hsTPpNDZmIb3rszUz4pngn6ywc94UyK:8hXxogyoxUBqrXzpp8G3rqpgnmI
Static task
static1
Behavioral task
behavioral1
Sample
243424396-041942-sanlccjavap0003-2745.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
243424396-041942-sanlccjavap0003-2745.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/
Targets
-
-
Target
243424396-041942-sanlccjavap0003-2745.exe
-
Size
485KB
-
MD5
570f75822327ab67501bcf60b5a5015d
-
SHA1
f8247519442122f8b727910ae977a3072b9e706e
-
SHA256
3e60205f7f9428199cf532ac669704b7c0b4112f35aa8061d6efc941948e9e35
-
SHA512
e2aa892438630c43d1fb07d5cf1ecc5781d6a8079385d4095eaa83aba9a5234a78111d396b91499b405adde712c4b6fb6be9db9dc7aaa16d6f5dcc64f3cea912
-
SSDEEP
6144:aasRfC5mAhrNngWKklCnLUP4igs2fr0hQtP9pDpmIblrsXU/4pd6nscwcT4UyO:erAvguoLUNUrfB99sGlrEpsncM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Loads dropped DLL
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
cf85183b87314359488b850f9e97a698
-
SHA1
6b6c790037eec7ebea4d05590359cb4473f19aea
-
SHA256
3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac
-
SHA512
fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b
-
SSDEEP
96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1