General
-
Target
PRE-ALERT PO8782JH.exe
-
Size
1.1MB
-
Sample
250121-jksztatldy
-
MD5
929b131dc33f70b2b765d8f2572a2801
-
SHA1
9d7168e1af408a364e5093214a89d3524c8e358e
-
SHA256
e3c29265116b650933ce33d627e11fd411c76c12d506864aeb4d352f34b3f27e
-
SHA512
fc68db6a62dfe940acf3e03ae94e0a0bf882d1256479cd4a7e0091f8c50a3da3f0149a6f5291c84252ee414160abe4195c5167fb2b00923f642dcd4e2fef3d3f
-
SSDEEP
24576:QcAag3fZjJnpcpQlyQ1cfW+15F2veZMpD1+2mv40CuD:QdBP7ADwmOVmvRC
Static task
static1
Behavioral task
behavioral1
Sample
PRE-ALERT PO8782JH.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PRE-ALERT PO8782JH.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
s4.serv00.com - Port:
21 - Username:
f2241_evica - Password:
Doll280@@
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_evica - Password:
Doll280@@
Targets
-
-
Target
PRE-ALERT PO8782JH.exe
-
Size
1.1MB
-
MD5
929b131dc33f70b2b765d8f2572a2801
-
SHA1
9d7168e1af408a364e5093214a89d3524c8e358e
-
SHA256
e3c29265116b650933ce33d627e11fd411c76c12d506864aeb4d352f34b3f27e
-
SHA512
fc68db6a62dfe940acf3e03ae94e0a0bf882d1256479cd4a7e0091f8c50a3da3f0149a6f5291c84252ee414160abe4195c5167fb2b00923f642dcd4e2fef3d3f
-
SSDEEP
24576:QcAag3fZjJnpcpQlyQ1cfW+15F2veZMpD1+2mv40CuD:QdBP7ADwmOVmvRC
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1