General
-
Target
31f96affd4d0d656732fc019768584751e08f30e6dce65a3518354011fbc613a
-
Size
1.4MB
-
Sample
250112-byzerazkg1
-
MD5
628ff5429348a077681f2280b12c82da
-
SHA1
4d49fd955e7f73cb72b30e99f15238f1eed6b87a
-
SHA256
31f96affd4d0d656732fc019768584751e08f30e6dce65a3518354011fbc613a
-
SHA512
7c7f575fb599c5ab4bf11544c099389dd023483aae24187e350164cade54de26b6d59a3c591e0a8e717e325c79953b64c9326dd2089820c0d0e0c95ec14644d9
-
SSDEEP
24576:1g7+2lVqhGYHrhn3722PUrJYy9KELn+r4gsv1RIAhjLoamMiX4lNmZg0YxegPbUY:1g7ZDqhGYHFn3S2MY+n+r4gwjLoyEkmL
Static task
static1
Behavioral task
behavioral1
Sample
31f96affd4d0d656732fc019768584751e08f30e6dce65a3518354011fbc613a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
31f96affd4d0d656732fc019768584751e08f30e6dce65a3518354011fbc613a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
ssl0.ovh.net - Port:
587 - Username:
[email protected] - Password:
SZx^87o69m - Email To:
[email protected]
Targets
-
-
Target
31f96affd4d0d656732fc019768584751e08f30e6dce65a3518354011fbc613a
-
Size
1.4MB
-
MD5
628ff5429348a077681f2280b12c82da
-
SHA1
4d49fd955e7f73cb72b30e99f15238f1eed6b87a
-
SHA256
31f96affd4d0d656732fc019768584751e08f30e6dce65a3518354011fbc613a
-
SHA512
7c7f575fb599c5ab4bf11544c099389dd023483aae24187e350164cade54de26b6d59a3c591e0a8e717e325c79953b64c9326dd2089820c0d0e0c95ec14644d9
-
SSDEEP
24576:1g7+2lVqhGYHrhn3722PUrJYy9KELn+r4gsv1RIAhjLoamMiX4lNmZg0YxegPbUY:1g7ZDqhGYHFn3S2MY+n+r4gwjLoyEkmL
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1