General
-
Target
5f5debb7f8f2d6f8c90608bc1a6981fe7df82cf9a4ed713436f572d45addf284
-
Size
687KB
-
Sample
250115-plsnbssmgx
-
MD5
925ffeffd7dff776671f729416a1ef26
-
SHA1
3c106bb1404706235849ac84da35cb44fabb5882
-
SHA256
5f5debb7f8f2d6f8c90608bc1a6981fe7df82cf9a4ed713436f572d45addf284
-
SHA512
a5124116d25a81a7ec30c9079770eac26489260cbfe6add0411fcc426b5180a8309f88fe73b622c7d53bb0c6fcf1b5c366568bbcac7e9ba7eb4f92704273c0e6
-
SSDEEP
12288:ZoIB1oVeon72YB1qKIaC6BIAY106LRxWvgKV++w4sF7zLR/jAQ4NPHDyuaK3NLxY:Zoqo5xB1bGDxR4gWw4sF75n2fDoK3NLP
Static task
static1
Behavioral task
behavioral1
Sample
5f5debb7f8f2d6f8c90608bc1a6981fe7df82cf9a4ed713436f572d45addf284.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f5debb7f8f2d6f8c90608bc1a6981fe7df82cf9a4ed713436f572d45addf284.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.brusln.com - Port:
587 - Username:
[email protected] - Password:
Countrycode@2024 - Email To:
[email protected]
Targets
-
-
Target
5f5debb7f8f2d6f8c90608bc1a6981fe7df82cf9a4ed713436f572d45addf284
-
Size
687KB
-
MD5
925ffeffd7dff776671f729416a1ef26
-
SHA1
3c106bb1404706235849ac84da35cb44fabb5882
-
SHA256
5f5debb7f8f2d6f8c90608bc1a6981fe7df82cf9a4ed713436f572d45addf284
-
SHA512
a5124116d25a81a7ec30c9079770eac26489260cbfe6add0411fcc426b5180a8309f88fe73b622c7d53bb0c6fcf1b5c366568bbcac7e9ba7eb4f92704273c0e6
-
SSDEEP
12288:ZoIB1oVeon72YB1qKIaC6BIAY106LRxWvgKV++w4sF7zLR/jAQ4NPHDyuaK3NLxY:Zoqo5xB1bGDxR4gWw4sF75n2fDoK3NLP
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1