General
-
Target
a90376e69a69555a4e215171be0130521d5fa893f1719129196390e32c198d1d
-
Size
422KB
-
Sample
250111-bq6tvswrds
-
MD5
257f1ef70d60e2ecf6583d4d9bd2df55
-
SHA1
a7b9e77c99d981643041ef7dff0f9de75cd9840b
-
SHA256
a90376e69a69555a4e215171be0130521d5fa893f1719129196390e32c198d1d
-
SHA512
c5e0d1a84d14a9a5c53d0a0c1e513167effe1a5b34711d972155cac7c57fc19a28d12b74061f670fd28114873b82b22574a2883d35c93c18c1571010e2796d00
-
SSDEEP
12288:NPmmYhHlM/XoLSf0Ghz99G3SeR1NzMsJ78:dpYhHlQvzKR/MsJo
Static task
static1
Behavioral task
behavioral1
Sample
HBL # SZNLAX3030890775 - TD230912001A/HBL # SZNLAX3030890775 - TD230912001A.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
HBL # SZNLAX3030890775 - TD230912001A/HBL # SZNLAX3030890775 - TD230912001A.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_evico - Password:
Doll650#@
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2241_evico - Password:
Doll650#@
Targets
-
-
Target
HBL # SZNLAX3030890775 - TD230912001A/HBL # SZNLAX3030890775 - TD230912001A.exe
-
Size
920KB
-
MD5
219a95000b6d3aaa75463c5a2b5d0a23
-
SHA1
4d0756f8fed9f292cf2da488cbcf86cc8b55074b
-
SHA256
c413ed27fe8d4271dd5d6965632a60e97a6e5d53e1e8aaf09375ce4c8708213b
-
SHA512
bb5252714a6ea4865c54fb8ae9f83a5c9b6c190571f0cdc63f743a5b70a982b53492155b64fd3b0a2891e64360c3e8bddea3a54336bbae662ba0df83ba79ddae
-
SSDEEP
12288:Oh4HTLUkSr6KBgC0fLjbHEoBKy0aMaSzOKy2r7SPN1ndm:1TLUkS+K30fzHj9MaSSKy2/SPN1ng
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1