General
-
Target
030964274f733e0ee36325bb31c5782fcdbaebe2b5b48223f294a86748e6afa8.exe
-
Size
653KB
-
Sample
250111-chynys1lbr
-
MD5
2223635bfd2858c030d72df51b6b9bac
-
SHA1
325ddb9b3d095ef1a185d71dbb1677ef86ee2128
-
SHA256
030964274f733e0ee36325bb31c5782fcdbaebe2b5b48223f294a86748e6afa8
-
SHA512
934c5ff2b10f82370781bb0b4e676c95b0dc1e1206d972f173d4239476852ded7e2f6ab3a6506243f4af05bb7217634d6e37967775fd36cf6590364dfa77dbc2
-
SSDEEP
12288:OT6TNcuLRQi1QKmm/SIo6I6JT/szfpdCM:BayRzzaY/szfXC
Static task
static1
Behavioral task
behavioral1
Sample
030964274f733e0ee36325bb31c5782fcdbaebe2b5b48223f294a86748e6afa8.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
030964274f733e0ee36325bb31c5782fcdbaebe2b5b48223f294a86748e6afa8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.zoho.eu - Port:
587 - Username:
[email protected] - Password:
office12#
Extracted
agenttesla
Protocol: smtp- Host:
smtp.zoho.eu - Port:
587 - Username:
[email protected] - Password:
office12# - Email To:
[email protected]
Targets
-
-
Target
030964274f733e0ee36325bb31c5782fcdbaebe2b5b48223f294a86748e6afa8.exe
-
Size
653KB
-
MD5
2223635bfd2858c030d72df51b6b9bac
-
SHA1
325ddb9b3d095ef1a185d71dbb1677ef86ee2128
-
SHA256
030964274f733e0ee36325bb31c5782fcdbaebe2b5b48223f294a86748e6afa8
-
SHA512
934c5ff2b10f82370781bb0b4e676c95b0dc1e1206d972f173d4239476852ded7e2f6ab3a6506243f4af05bb7217634d6e37967775fd36cf6590364dfa77dbc2
-
SSDEEP
12288:OT6TNcuLRQi1QKmm/SIo6I6JT/szfpdCM:BayRzzaY/szfXC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1