General
-
Target
c413ed27fe8d4271dd5d6965632a60e97a6e5d53e1e8aaf09375ce4c8708213b
-
Size
920KB
-
Sample
250108-bf55ksxkez
-
MD5
219a95000b6d3aaa75463c5a2b5d0a23
-
SHA1
4d0756f8fed9f292cf2da488cbcf86cc8b55074b
-
SHA256
c413ed27fe8d4271dd5d6965632a60e97a6e5d53e1e8aaf09375ce4c8708213b
-
SHA512
bb5252714a6ea4865c54fb8ae9f83a5c9b6c190571f0cdc63f743a5b70a982b53492155b64fd3b0a2891e64360c3e8bddea3a54336bbae662ba0df83ba79ddae
-
SSDEEP
12288:Oh4HTLUkSr6KBgC0fLjbHEoBKy0aMaSzOKy2r7SPN1ndm:1TLUkS+K30fzHj9MaSSKy2/SPN1ng
Static task
static1
Behavioral task
behavioral1
Sample
c413ed27fe8d4271dd5d6965632a60e97a6e5d53e1e8aaf09375ce4c8708213b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c413ed27fe8d4271dd5d6965632a60e97a6e5d53e1e8aaf09375ce4c8708213b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_evico - Password:
Doll650#@
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2241_evico - Password:
Doll650#@
Targets
-
-
Target
c413ed27fe8d4271dd5d6965632a60e97a6e5d53e1e8aaf09375ce4c8708213b
-
Size
920KB
-
MD5
219a95000b6d3aaa75463c5a2b5d0a23
-
SHA1
4d0756f8fed9f292cf2da488cbcf86cc8b55074b
-
SHA256
c413ed27fe8d4271dd5d6965632a60e97a6e5d53e1e8aaf09375ce4c8708213b
-
SHA512
bb5252714a6ea4865c54fb8ae9f83a5c9b6c190571f0cdc63f743a5b70a982b53492155b64fd3b0a2891e64360c3e8bddea3a54336bbae662ba0df83ba79ddae
-
SSDEEP
12288:Oh4HTLUkSr6KBgC0fLjbHEoBKy0aMaSzOKy2r7SPN1ndm:1TLUkS+K30fzHj9MaSSKy2/SPN1ng
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1