General
-
Target
bb7470e701e69e7db13b72b196ee82df8447dfef2bcecc41b573986803783166
-
Size
856KB
-
Sample
250112-bes4maxqgw
-
MD5
347fcf7b8e02b11e2aa163ee64add47d
-
SHA1
dd13fee38c2b6d4c901b32f950511115e5c97a32
-
SHA256
bb7470e701e69e7db13b72b196ee82df8447dfef2bcecc41b573986803783166
-
SHA512
b2d161e83e8b6efb3d18ab7cbd9799282f2258be9cd3ecc3d32c07e40ce45975281de09d44a7473503be9453a4624dff93d66fba197c065a2d8fc13859a7eac4
-
SSDEEP
12288:b1dzNpvxRwPX6beqZH9NZJ70N1u1NGA/Daa4Z6DhwWXdfrZ2qKUFLIxy1GunJRL+:b1dzNVxx1TLp2UFLIuoqM
Static task
static1
Behavioral task
behavioral1
Sample
bb7470e701e69e7db13b72b196ee82df8447dfef2bcecc41b573986803783166.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bb7470e701e69e7db13b72b196ee82df8447dfef2bcecc41b573986803783166.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server1.sqsendy.shop - Port:
587 - Username:
[email protected] - Password:
^Qt*UoquP.CM - Email To:
[email protected]
Targets
-
-
Target
bb7470e701e69e7db13b72b196ee82df8447dfef2bcecc41b573986803783166
-
Size
856KB
-
MD5
347fcf7b8e02b11e2aa163ee64add47d
-
SHA1
dd13fee38c2b6d4c901b32f950511115e5c97a32
-
SHA256
bb7470e701e69e7db13b72b196ee82df8447dfef2bcecc41b573986803783166
-
SHA512
b2d161e83e8b6efb3d18ab7cbd9799282f2258be9cd3ecc3d32c07e40ce45975281de09d44a7473503be9453a4624dff93d66fba197c065a2d8fc13859a7eac4
-
SSDEEP
12288:b1dzNpvxRwPX6beqZH9NZJ70N1u1NGA/Daa4Z6DhwWXdfrZ2qKUFLIxy1GunJRL+:b1dzNVxx1TLp2UFLIuoqM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1