General
-
Target
8fa7d10753c9faa5620a32534394bbb36d5d1f5c8d5a4e452697d0309308a2ee
-
Size
1.4MB
-
Sample
250112-bg88mayjay
-
MD5
361b69a8402d43c3d8b59c4a001565d4
-
SHA1
3b7ff97c4080dc92cf749789d02876eba0585efd
-
SHA256
8fa7d10753c9faa5620a32534394bbb36d5d1f5c8d5a4e452697d0309308a2ee
-
SHA512
c3f9090844ca597209575d3550164a33c1685a60d775b5f5f4df4708308174c681c2d9e4ca7844b77ab447fd2fcb70e7c706a3bd9ff98fa1ef887ff24edf8e82
-
SSDEEP
24576:eok2iuqqskQDetS91mQlQXmv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:eAiuqbkUeY77KWjLoyEkmZ9Y14
Static task
static1
Behavioral task
behavioral1
Sample
8fa7d10753c9faa5620a32534394bbb36d5d1f5c8d5a4e452697d0309308a2ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8fa7d10753c9faa5620a32534394bbb36d5d1f5c8d5a4e452697d0309308a2ee.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5826219676:AAHzaO_KidyTjZ5PTwFErYpZivpT8wfDUno/
Targets
-
-
Target
8fa7d10753c9faa5620a32534394bbb36d5d1f5c8d5a4e452697d0309308a2ee
-
Size
1.4MB
-
MD5
361b69a8402d43c3d8b59c4a001565d4
-
SHA1
3b7ff97c4080dc92cf749789d02876eba0585efd
-
SHA256
8fa7d10753c9faa5620a32534394bbb36d5d1f5c8d5a4e452697d0309308a2ee
-
SHA512
c3f9090844ca597209575d3550164a33c1685a60d775b5f5f4df4708308174c681c2d9e4ca7844b77ab447fd2fcb70e7c706a3bd9ff98fa1ef887ff24edf8e82
-
SSDEEP
24576:eok2iuqqskQDetS91mQlQXmv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:eAiuqbkUeY77KWjLoyEkmZ9Y14
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1