General
-
Target
b4af503b7d9179eb808b870b5c8e7315a73b450aa34c7a34b0e04ab37c6b704e
-
Size
317KB
-
Sample
250115-bkfeqavrgw
-
MD5
141bf5870f0ca9970ac435c906c02f94
-
SHA1
2d42ac258a0d71961ff17a27a6b6a4ee5edcea91
-
SHA256
b4af503b7d9179eb808b870b5c8e7315a73b450aa34c7a34b0e04ab37c6b704e
-
SHA512
eafea048ee47c02a5e42010d156a19c1d50a93f28ef07f2f7016c103c30898de62829d241272c42f37ee330242fd21597c3ee8858ef84595efa9fda9d9292c07
-
SSDEEP
6144:+2xFKNaKy75wu+GO2P1wHfUuG/WggmZP7dZDj4tS8zC7+LdK/XLWFyiLqs:+U8apVwg9HJHZP7AtxzPhFyYqs
Static task
static1
Behavioral task
behavioral1
Sample
154115000016 ORIGINAL BL/154115000016 ORIGINAL BL.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
154115000016 ORIGINAL BL/154115000016 ORIGINAL BL.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_evica - Password:
Doll650@@
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2241_evica - Password:
Doll650@@
Targets
-
-
Target
154115000016 ORIGINAL BL/154115000016 ORIGINAL BL.exe
-
Size
405KB
-
MD5
5cadfbc68c15216faf08c1c04a7b7f11
-
SHA1
7119d4db597929b296dee14afff6cbd7db796cbd
-
SHA256
50185ca39cb007d72d4ddecccf974236a866615fd39acf6568c0a07f43a31215
-
SHA512
01625e44121b9380996de4fc855fb972ab9771096bd61c8f421b93dfdbb2c8691641609dab567ca2d5d009c6a06ae73b21dbc4e29bb44c47f41a5a2211fadd64
-
SSDEEP
6144:4/gz6nNOvt0g5WuHdoq6Otx+WDNa2OP4yJNdAxcr1S8zvtl1Aoq4Yth:4UfvtcuHdoq6Ex+MxOP4cO2xzW5z
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1