General
-
Target
73894a44f50d540cf14e33e708771ddd1a83eb63ef9946f119af55a7aea73b60
-
Size
1.1MB
-
Sample
250120-avxajssqbt
-
MD5
c02fafba914752805e5600ff9bb7a95f
-
SHA1
9494193b4598da774e76fce5ee59e3aa714dc1e2
-
SHA256
73894a44f50d540cf14e33e708771ddd1a83eb63ef9946f119af55a7aea73b60
-
SHA512
ba27a831ee96dff1c6ac3a937de89b1604184ebc14a74b202f40d93442c31b649af4cfca5767cdcca0eeb206a9a52f050b534b04ba2eedec4f1241e94b430d2d
-
SSDEEP
24576:0O9Cm66XrzjnnpCp2lyk1CJ8+FrFIveDmpJ1+4YP4uCuv:0azDpRA5GmABYPJCW
Static task
static1
Behavioral task
behavioral1
Sample
Checklist Job no.1333/Checklist Job no.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Checklist Job no.1333/Checklist Job no.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2241_evica - Password:
Doll280@@
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_evica - Password:
Doll280@@
Targets
-
-
Target
Checklist Job no.1333/Checklist Job no.exe
-
Size
1.1MB
-
MD5
929b131dc33f70b2b765d8f2572a2801
-
SHA1
9d7168e1af408a364e5093214a89d3524c8e358e
-
SHA256
e3c29265116b650933ce33d627e11fd411c76c12d506864aeb4d352f34b3f27e
-
SHA512
fc68db6a62dfe940acf3e03ae94e0a0bf882d1256479cd4a7e0091f8c50a3da3f0149a6f5291c84252ee414160abe4195c5167fb2b00923f642dcd4e2fef3d3f
-
SSDEEP
24576:QcAag3fZjJnpcpQlyQ1cfW+15F2veZMpD1+2mv40CuD:QdBP7ADwmOVmvRC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1