General
-
Target
f1049da8849c46cb525c5c5b7fec35a5f5d19b756722bf9258051de2444d6b86
-
Size
1.2MB
-
Sample
250116-p3672sskal
-
MD5
ab472be576564aebd32002326c78d763
-
SHA1
7d7dc9464d20fed353e67dbed4161205dad7d302
-
SHA256
f1049da8849c46cb525c5c5b7fec35a5f5d19b756722bf9258051de2444d6b86
-
SHA512
971eea851cc87bafa7685a2bbc55619b74cc42e3b29d6da92287a22a95185271c691585e383b52216f49568bf60093139601cc7c1581e3a9edaa47a0604f93ec
-
SSDEEP
24576:ob/bfBifTb94zEdatD5r7VHNIJV8iyjN1lcr/N5HoN7QUMm:INifN4YcZ5PVHNIJVv41l4KN7QUMm
Static task
static1
Behavioral task
behavioral1
Sample
BL2037276670/BL2037276670.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BL2037276670/BL2037276670.scr
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2241_dod - Password:
Doll900@@
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_dod - Password:
Doll900@@
Targets
-
-
Target
BL2037276670/BL2037276670.scr
-
Size
1.4MB
-
MD5
049f7f0e1c6c775baf0befec50ba65ea
-
SHA1
30600fafe3af94a79c9a75711d3cbacd13ce44b3
-
SHA256
2ad8a2171a97882062d7a344904ee2b6a36d98f8d28b1f765476d13bf8518c1c
-
SHA512
9bacc899b52f95e54e34f54b90656144f864f95cb94579e5ba5bcb14910423a8010b0d12a8adf913958ca475d82c0cc18b6d4745b434b90a405cdcf9be177cd8
-
SSDEEP
24576:XF0rdJ59y/uFYHDRr7/HNiJV8ey7NFlurHN5rQJ7Oy:wRy2CjRP/HNiJVhQFl4uJ7Oy
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1